{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:15Z","timestamp":1750306095440,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,29]],"date-time":"2017-03-29T00:00:00Z","timestamp":1490745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,29]]},"DOI":"10.1145\/3070617.3070627","type":"proceedings-article","created":{"date-parts":[[2017,6,8]],"date-time":"2017-06-08T14:42:54Z","timestamp":1496932974000},"page":"71-75","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Security Analysis and Reinforcement Design Adopting Fingerprints over Drawbacks of Passwords Based Authentication in Remote Home Automation Control System"],"prefix":"10.1145","author":[{"given":"Mukundwa","family":"Chantal","sequence":"first","affiliation":[{"name":"Computer Engineering, Ajou University"}]},{"given":"Seok Won","family":"Lee","sequence":"additional","affiliation":[{"name":"Depts. of Software Convergence Technology \/ Information &amp; Computer Engineering, Ajou University"}]},{"given":"Ki Hyung","family":"Kim","sequence":"additional","affiliation":[{"name":"Dept. of Knowledge and Information Engineering, Ajou University"}]}],"member":"320","published-online":{"date-parts":[[2017,3,29]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Cyril Jose A. and Malekian R. 2015. Smart Home Automation Security: A Literature Review. The Smart Computing Review. (2015).  Cyril Jose A. and Malekian R. 2015. Smart Home Automation Security: A Literature Review. The Smart Computing Review. (2015).","key":"e_1_3_2_1_1_1","DOI":"10.6029\/smartcr.2015.04.004"},{"unstructured":"http:\/\/internetofthingsagenda.techtarget.com\/definition\/home-automation: 2015. http:\/\/What Is Home Automation?. Accessed: 2016-10-27.  http:\/\/internetofthingsagenda.techtarget.com\/definition\/home-automation: 2015. http:\/\/What Is Home Automation?. Accessed: 2016-10-27.","key":"e_1_3_2_1_2_1"},{"unstructured":"http:\/\/lifehacker.com\/how-can-i-get-started-with-home-automation-510246491: 2013. Accessed: 2016-10-27.  http:\/\/lifehacker.com\/how-can-i-get-started-with-home-automation-510246491: 2013. Accessed: 2016-10-27.","key":"e_1_3_2_1_3_1"},{"unstructured":"http:\/\/criminal.findlaw.com\/criminal-procedure\/fingerprints-the-first-id.html: 2016. Accessed: 2016-10-24.  http:\/\/criminal.findlaw.com\/criminal-procedure\/fingerprints-the-first-id.html: 2016. Accessed: 2016-10-24.","key":"e_1_3_2_1_4_1"},{"unstructured":"http:\/\/www.cio.com\/article\/2454883\/consumer-technology\/fingerprint-faceoff-apple-touch-id-vs-samsung-finger-scanner.html: 2014. Accessed: 2016-10-18.  http:\/\/www.cio.com\/article\/2454883\/consumer-technology\/fingerprint-faceoff-apple-touch-id-vs-samsung-finger-scanner.html: 2014. Accessed: 2016-10-18.","key":"e_1_3_2_1_5_1"},{"unstructured":"http:\/\/www.explainthatstuff.com\/fingerprintscanners.html: 2016. Accessed: 2016-10-27.  http:\/\/www.explainthatstuff.com\/fingerprintscanners.html: 2016. Accessed: 2016-10-27.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/IIH-MSP.2009.51"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/IIH-MSP.2009.51"},{"unstructured":"Jain A. http:\/\/biometrics.cse.msu.edu\/Presentations\/AnilJain_UniquenessOfFingerprints_NAS05.pdf.  Jain A. http:\/\/biometrics.cse.msu.edu\/Presentations\/AnilJain_UniquenessOfFingerprints_NAS05.pdf.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","article-title":"Smart Home Automation Security","volume":"5","author":"Cyril Jose A.","year":"2015","journal-title":"A Literature Review. The Smart Computing Review."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1155\/2012\/519723"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/SPW.2013.19"},{"unstructured":"http:\/\/developer.samsung.com\/galaxy\/pass: 2016. Accessed: 2016-10-20.  http:\/\/developer.samsung.com\/galaxy\/pass: 2016. Accessed: 2016-10-20.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","article-title":"Android Based Home Automation System Using Bluetooth & Voice Command","volume":"03","author":"Pandya B.","year":"2016","journal-title":"International Research Journal of Engineering and Technology (IRJET)."},{"key":"e_1_3_2_1_15_1","article-title":"Design of a Home Automation System Using Arduino","volume":"6","author":"David N.","year":"2015","journal-title":"International Journal of Scientific & Engineering Research."},{"unstructured":"https:\/\/developer.android.com\/about\/versions\/marshmallow\/android-6.0.html: 2016. Accessed: 2016-10-20.  https:\/\/developer.android.com\/about\/versions\/marshmallow\/android-6.0.html: 2016. Accessed: 2016-10-20.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/SPW.2013.19"},{"unstructured":"http:\/\/www.androidauthority.com\/how-fingerprint-scanners-work-670934\/: 2016. Accessed: 2016- 11- 12.  http:\/\/www.androidauthority.com\/how-fingerprint-scanners-work-670934\/: 2016. Accessed: 2016- 11- 12.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","first-page":"149","article-title":"Bluetooth Remote Home Automation System Using Android Application","volume":"2","author":"Ramlee R.","year":"2013","journal-title":"The International Journal of Engineering And Science (IJES)."},{"unstructured":"http:\/\/searchsecurity.techtarget.com\/definition\/brute-force-cracking: 2006. Accessed: 2016- 11- 17.  http:\/\/searchsecurity.techtarget.com\/definition\/brute-force-cracking: 2006. Accessed: 2016- 11- 17.","key":"e_1_3_2_1_20_1"},{"unstructured":"Baloch R. 2011. An Introduction To Keyloggers RATS And Malware.  Baloch R. 2011. An Introduction To Keyloggers RATS And Malware.","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"crossref","unstructured":"Y Rashid M. and Zaki H. RSA Cryptographic Key Generation Using Fingerprint Minutiae. Iraqi Commission for Computers & Informatics (ICCI) Iraqi Journal for Computers and Informatics (IJCI) 1 1 (2014) 66--69.  Y Rashid M. and Zaki H. RSA Cryptographic Key Generation Using Fingerprint Minutiae. Iraqi Commission for Computers & Informatics (ICCI) Iraqi Journal for Computers and Informatics (IJCI) 1 1 (2014) 66--69.","key":"e_1_3_2_1_22_1","DOI":"10.25195\/ijci.v41i1.101"},{"volume-title":"National Research Council of Canada","year":"2008","author":"Patrick A.","key":"e_1_3_2_1_23_1"}],"event":{"acronym":"IEEA '17","name":"IEEA '17: 6th International Conference on Informatics, Environment, Energy and Applications","location":"Jeju Republic of Korea"},"container-title":["Proceedings of the 6th International Conference on Informatics, Environment, Energy and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3070617.3070627","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3070617.3070627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:27Z","timestamp":1750217427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3070617.3070627"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,29]]},"references-count":23,"alternative-id":["10.1145\/3070617.3070627","10.1145\/3070617"],"URL":"https:\/\/doi.org\/10.1145\/3070617.3070627","relation":{},"subject":[],"published":{"date-parts":[[2017,3,29]]},"assertion":[{"value":"2017-03-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}