{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:27Z","timestamp":1738777227404,"version":"3.37.0"},"reference-count":17,"publisher":"Academy Publisher","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.10.2796-2804","type":"journal-article","created":{"date-parts":[[2014,10,6]],"date-time":"2014-10-06T14:03:16Z","timestamp":1412604196000},"source":"Crossref","is-referenced-by-count":0,"title":["A User Authentication Protocol based on Multiple Factors"],"prefix":"10.4304","volume":"9","author":[{"given":"Yonglong","family":"Tang","sequence":"first","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,10,6]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(98)00006-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2089516"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1277"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1380"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223677"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2225048"},{"issue":"1","key":"ref8","first-page":"1","article-title":"How do you know if it's a real finger? ID New swire","volume":"2","author":"Brown","year":"2003","unstructured":"[10] Brown C. How do you know if it's a real finger? ID New swire, Trends in Personal Identification and Biometrics, 2003; 2 (1) pp. 1-4.","journal-title":"Trends in Personal Identification and Biometrics"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2011.5955219"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.08.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.206"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.09.003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0125"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/el.2011.1525"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.34"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2184092"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2210215"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:08:18Z","timestamp":1738775298000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,6]]},"references-count":17,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2014,10,6]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.10.2796-2804","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,10,6]]}}}