{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:09Z","timestamp":1750220949855,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T00:00:00Z","timestamp":1553644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,27]]},"DOI":"10.1145\/3320326.3320401","type":"proceedings-article","created":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T15:12:03Z","timestamp":1558451523000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A Smart Card Digital Identity Check Model for University Services Access"],"prefix":"10.1145","author":[{"given":"Moukhliss","family":"Ghizlane","sequence":"first","affiliation":[{"name":"RITM Lab.; CED Engineering Sciences, ENSEM ESTC, Hassan II University, Casablanca, Morocco"}]},{"given":"Filali Hilali","family":"Reda","sequence":"additional","affiliation":[{"name":"RITM Lab.; Computer Engineering Department, ESTC, Hassan II University, Casablanca, Morocco"}]},{"given":"Belhadaoui","family":"Hicham","sequence":"additional","affiliation":[{"name":"RITM Lab.; Computer Engineering Department, ESTC, Hassan II University, Casablanca, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2019,3,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2010 International Conference for Internet Technology and Secured Transactions (Nov.","author":"Al-Assam H.","year":"2010","unstructured":"Al-Assam , H. , Sellahewa , H. and Jassim , S . 2010. On security of multi-factor biometric authentication . 2010 International Conference for Internet Technology and Secured Transactions (Nov. 2010 ), 1--6. Al-Assam, H., Sellahewa, H. and Jassim, S. 2010. On security of multi-factor biometric authentication. 2010 International Conference for Internet Technology and Secured Transactions (Nov. 2010), 1--6."},{"key":"e_1_3_2_1_2_1","unstructured":"Chami M. 2014. Carte \u00e0 Puce Principes applications et Exercices corrig\u00e9s.  Chami M. 2014. Carte \u00e0 Puce Principes applications et Exercices corrig\u00e9s."},{"volume-title":"Dec. 21, 1999.","author":"Chan A.","key":"e_1_3_2_1_3_1","unstructured":"Chan , A. , Kekicheff , M.B. , Weise , J.M. and Wentker , D.C . 1999. System and method for a multiapplication smart card which can facilitate a post-issuance download of an application onto the smart card. US6005942A . Dec. 21, 1999. Chan, A., Kekicheff, M.B., Weise, J.M. and Wentker, D.C. 1999. System and method for a multiapplication smart card which can facilitate a post-issuance download of an application onto the smart card. US6005942A. Dec. 21, 1999."},{"key":"e_1_3_2_1_4_1","article-title":"Smartcard-Based Remote Authentication Scheme Preserving User Anonymity","author":"Cheul Shin K.","year":"2013","unstructured":"Cheul Shin , K. and Jong Oh , K. 2013 . Smartcard-Based Remote Authentication Scheme Preserving User Anonymity . International Journal of Information Processing and Management. 4 , ( Apr. 2013), 10--18. Cheul Shin, K. and Jong Oh, K. 2013. Smartcard-Based Remote Authentication Scheme Preserving User Anonymity. International Journal of Information Processing and Management. 4, (Apr. 2013), 10--18.","journal-title":"International Journal of Information Processing and Management. 4"},{"key":"e_1_3_2_1_5_1","unstructured":"Chung-Huang Yang 1999. On the design of campus-wide multi-purpose smart card systems. (1999) 465--468.  Chung-Huang Yang 1999. On the design of campus-wide multi-purpose smart card systems. (1999) 465--468."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.206"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.006"},{"key":"e_1_3_2_1_8_1","volume-title":"Foiling the cracker. A survey of, and improvements to, password security. Programming and computer software. 17, 3","author":"Klein D.V.","year":"1992","unstructured":"Klein , D.V. 1992. Foiling the cracker. A survey of, and improvements to, password security. Programming and computer software. 17, 3 ( 1992 ), 158--166. Klein, D.V. 1992. Foiling the cracker. A survey of, and improvements to, password security. Programming and computer software. 17, 3 (1992), 158--166."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom.2014.35"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.01.007"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.03.002"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(97)00040-6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13775-4_30"},{"key":"e_1_3_2_1_16_1","volume-title":"Appraising the Smart Card Technology Adoption","author":"Taherdoost H.","year":"2017","unstructured":"Taherdoost , H. 2017. Appraising the Smart Card Technology Adoption ; Case of Application in University Environment . ( 2017 ), 1049--1057. Taherdoost, H. 2017. Appraising the Smart Card Technology Adoption; Case of Application in University Environment. (2017), 1049--1057."},{"key":"e_1_3_2_1_17_1","volume-title":"Procedia Technology. 12","author":"Taherdoost H.","year":"2014","unstructured":"Taherdoost , H. , Sahibuddin , S. and Jalaliyoon , N . 2014. Features' Evaluation of Goods, Services and E-services; Electronic Service Characteristics Exploration . Procedia Technology. 12 , ( Jan. 2014 ), 204--211. Taherdoost, H., Sahibuddin, S. and Jalaliyoon, N. 2014. Features' Evaluation of Goods, Services and E-services; Electronic Service Characteristics Exploration. Procedia Technology. 12, (Jan. 2014), 204--211."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.09.012"},{"key":"e_1_3_2_1_19_1","volume-title":"Information and Software Technology. 96","author":"Vel\u00e1squez I.","year":"2018","unstructured":"Vel\u00e1squez , I. , Caro , A. and Rodr\u00edguez , A . 2018. Kontun: A Framework for recommendation of authentication schemes and methods . Information and Software Technology. 96 , ( Apr. 2018 ), 27--37. Vel\u00e1squez, I., Caro, A. and Rodr\u00edguez, A. 2018. Kontun: A Framework for recommendation of authentication schemes and methods. Information and Software Technology. 96, (Apr. 2018), 27--37."},{"key":"e_1_3_2_1_20_1","volume-title":"-Z","author":"Wang S.-Q.","year":"2013","unstructured":"Wang , S.-Q. , Wang , J.-Y. and Li , Y . -Z . 2013 . The Web Security Password Authentication based the Single-block Hash Function. IERI Procedia . 4, (Jan. 2013), 2--7. Wang, S.-Q., Wang, J.-Y. and Li, Y.-Z. 2013. The Web Security Password Authentication based the Single-block Hash Function. IERI Procedia. 4, (Jan. 2013), 2--7."},{"key":"e_1_3_2_1_21_1","unstructured":"Xin-mei L. Qiu-xiang Y. and Xing-lai L. 2007. Design of Campus Smart Card System and Its Application in Educational Administration-- &Lt;Journal of North University of China(Natural Science Edition)&Gt; 2007\u5e7402\u671f.  Xin-mei L. Qiu-xiang Y. and Xing-lai L. 2007. Design of Campus Smart Card System and Its Application in Educational Administration-- &Lt;Journal of North University of China(Natural Science Edition)&Gt; 2007\u5e7402\u671f."}],"event":{"name":"NISS19: Networking, Information Systems & Security","acronym":"NISS19","location":"Rabat Morocco"},"container-title":["Proceedings of the 2nd International Conference on Networking, Information Systems &amp; Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320326.3320401","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320326.3320401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:56Z","timestamp":1750204436000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320326.3320401"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,27]]},"references-count":20,"alternative-id":["10.1145\/3320326.3320401","10.1145\/3320326"],"URL":"https:\/\/doi.org\/10.1145\/3320326.3320401","relation":{},"subject":[],"published":{"date-parts":[[2019,3,27]]},"assertion":[{"value":"2019-03-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}