{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T22:34:25Z","timestamp":1764714865148,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T00:00:00Z","timestamp":1536537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002261","name":"Russian Foundation for Basic Research","doi-asserted-by":"publisher","award":["18-07-01347"],"award-info":[{"award-number":["18-07-01347"]}],"id":[{"id":"10.13039\/501100002261","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,10]]},"DOI":"10.1145\/3264437.3264439","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T12:56:36Z","timestamp":1539694596000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Bypass Biometric Lock Systems With Gelatin Artificial Fingerprint"],"prefix":"10.1145","author":[{"given":"Ekaterina","family":"Maro","sequence":"first","affiliation":[{"name":"Dept. of Information Security, Institute of Computer Technologies and Information Security, Southern Federal University, Taganrog, Russia"}]},{"given":"Maksim","family":"Kovalchuk","sequence":"additional","affiliation":[{"name":"Dept. of Information Security, Institute of Computer Technologies and Information Security, Southern Federal University, Taganrog, Russia"}]}],"member":"320","published-online":{"date-parts":[[2018,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Sanaa Ghouzali Maryam Lafkih Wadood Abdul Mounia Mikram Mohammed El Haziti and Driss Aboutajdine \"Trace Attack against Biometric Mobile Applications\" Mobile Information Systems vol. 2016.  Sanaa Ghouzali Maryam Lafkih Wadood Abdul Mounia Mikram Mohammed El Haziti and Driss Aboutajdine \"Trace Attack against Biometric Mobile Applications\" Mobile Information Systems vol. 2016.","DOI":"10.1155\/2016\/2065948"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2581306"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2797000"},{"volume-title":"Black Hat Conference","year":"2015","author":"Zhang Yulong","key":"e_1_3_2_1_5_1"},{"volume-title":"Network and Distributed System Security Symposium (NDSS), February 19th","year":"2018","author":"Bianchi Antonio","key":"e_1_3_2_1_6_1"},{"volume-title":"RSA conference","year":"2015","author":"Zhang Yulong","key":"e_1_3_2_1_7_1"}],"event":{"name":"SIN '18: 11th International Conference On Security Of Information and Networks","sponsor":["Cardiff University Cardiff University"],"location":"Cardiff United Kingdom","acronym":"SIN '18"},"container-title":["Proceedings of the 11th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264437.3264439","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264437.3264439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:35Z","timestamp":1750235975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264437.3264439"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,10]]},"references-count":6,"alternative-id":["10.1145\/3264437.3264439","10.1145\/3264437"],"URL":"https:\/\/doi.org\/10.1145\/3264437.3264439","relation":{},"subject":[],"published":{"date-parts":[[2018,9,10]]},"assertion":[{"value":"2018-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}