{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:42Z","timestamp":1750220862079,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377049.3377090","type":"proceedings-article","created":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T20:40:32Z","timestamp":1584736832000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An Analysis of Incentive Model (PII) to Maximize the Beneficiary Outreach by Ensuring Privacy"],"prefix":"10.1145","author":[{"given":"Sumaiya Binte","family":"Bashar","sequence":"first","affiliation":[{"name":"Computer Science &amp; Engineering American International University-Bangladesh, Dhaka, Bangladesh"}]},{"given":"Mohammad Samawat","family":"Ullah","sequence":"additional","affiliation":[{"name":"Computer Science American International University-Bangladesh, Dhaka, Bangladesh"}]},{"given":"Rawnak Rahman","family":"Mim","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Engineering American International University-Bangladesh, Dhaka, Bangladesh"}]},{"given":"Alfarrah Islam","family":"Sraboni","sequence":"additional","affiliation":[{"name":"Computer Science &amp; Software Engineering American International University-Bangladesh, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2020,3,20]]},"reference":[{"volume-title":"USENIX Workshop on Smart Card Technology","author":"Schneier B.","key":"e_1_3_2_1_1_1","unstructured":"Schneier, B. and Shostack, A., 1999, May. Breaking up is hard to do: modeling security threats for smart cards. In USENIX Workshop on Smart Card Technology, Chicago, Illinois, USA, http:\/\/www.counterpane.com\/smart-card-threats.html."},{"issue":"6","key":"e_1_3_2_1_2_1","first-page":"1670","article-title":"Fingerprint recognition system and techniques: A survey","volume":"4","author":"Sharma R.","year":"2013","unstructured":"Sharma, R., Mishra, N. and Yadav, S.K., 2013. Fingerprint recognition system and techniques: A survey. International Journal of Scientific & Engineering Research, 4(6), p.1670.","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"e_1_3_2_1_3_1","first-page":"435","volume-title":"Smart Card Commands","author":"Rankl W.","year":"2004","unstructured":"Rankl, W. and Effing, W., Smart Card Commands, 2004. Smart Card Handbook, Third Edition, pp.435--490."},{"key":"e_1_3_2_1_4_1","unstructured":"Deb Shinder | March 19 2002 12:00 AM PST"},{"key":"e_1_3_2_1_5_1","volume-title":"Smart Card: Turning Point of Technology.","author":"Mahajan A.","year":"2014","unstructured":"Mahajan, A., Verma, A. and Pahuja, D., 2014. Smart Card: Turning Point of Technology."},{"volume-title":"Open Smart Cards for Access Control, Services, and Applications","author":"Urien P.","key":"e_1_3_2_1_6_1","unstructured":"Urien, P., Open Smart Cards for Access Control, Services, and Applications pp c s."},{"issue":"2","key":"e_1_3_2_1_7_1","first-page":"74","article-title":"Smart card security; Technology and adoption","volume":"5","author":"Taherdoost H.","year":"2011","unstructured":"Taherdoost, H., Sahibuddin, S. and Jalaliyoon, N., 2011. Smart card security; Technology and adoption. International Journal of Security, 5(2), pp.74--84.","journal-title":"International Journal of Security"},{"key":"e_1_3_2_1_8_1","unstructured":"Islam M.K. 2012. Effective use of smart cards. SPM."},{"key":"e_1_3_2_1_9_1","first-page":"523","article-title":"Secure personal information card database system","volume":"6","author":"Berman P.","year":"2003","unstructured":"Berman, P., Eastman Kodak Co, 2003. Secure personal information card database system. U.S. Patent 6,523,116.","journal-title":"U.S. Patent"},{"key":"e_1_3_2_1_10_1","first-page":"483","article-title":"System for reading, storing and using bar-encoded data from a coded business card or other printed material","volume":"5","author":"Smith III, H.J.","year":"1996","unstructured":"Smith III, H.J. and White Jr, T.G., Smith, Iii, Herbert J., White, Jr. and Thomas G., 1996. System for reading, storing and using bar-encoded data from a coded business card or other printed material. U.S. Patent 5,483,052.","journal-title":"U.S. Patent"},{"key":"e_1_3_2_1_11_1","first-page":"101","article-title":"Client management system for social service organizations","volume":"10","author":"Storms J.","year":"2005","unstructured":"Storms, J. and Lauer, G., CATHOLIC CHARITIES OF MINNESOTA, 2005. Client management system for social service organizations. U.S. Patent Application 10\/815,101","journal-title":"U.S. Patent Application"}],"event":{"name":"ICCA 2020: International Conference on Computing Advancements","acronym":"ICCA 2020","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377090","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377049.3377090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:37Z","timestamp":1750202617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377090"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":11,"alternative-id":["10.1145\/3377049.3377090","10.1145\/3377049"],"URL":"https:\/\/doi.org\/10.1145\/3377049.3377090","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-03-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}