{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,14]],"date-time":"2023-10-14T17:20:51Z","timestamp":1697304051055},"reference-count":9,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2011,2,2]],"date-time":"2011-02-02T00:00:00Z","timestamp":1296604800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1002\/sec.240","type":"journal-article","created":{"date-parts":[[2011,2,3]],"date-time":"2011-02-03T03:35:02Z","timestamp":1296704102000},"page":"483-486","source":"Crossref","is-referenced-by-count":2,"title":["Biometric security for mobile computing"],"prefix":"10.1002","volume":"4","author":[{"given":"Jiankun","family":"Hu","sequence":"first","affiliation":[]},{"given":"Vijayakumar","family":"Bhagavatula","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Bennamoun","sequence":"additional","affiliation":[]},{"given":"Kar\u2010Ann","family":"Toh","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2011,2,2]]},"reference":[{"key":"e_1_2_2_2_2","doi-asserted-by":"crossref","unstructured":"XiK AhmadT HanF HuJ.A fingerprint based bio\u2010cryptographic security protocol designed for client\/server authentication in mobile computing environment.Security and Communication Networks DOI:10.1002\/sec.225.","DOI":"10.1002\/sec.225"},{"key":"e_1_2_2_3_2","doi-asserted-by":"crossref","unstructured":"ChoiB KimY Kar\u2010AnnToh.Fusion of visual and infrared face verification systems.Security and Communication Networks DOI:10.1002\/sec.251.","DOI":"10.1002\/sec.251"},{"key":"e_1_2_2_4_2","doi-asserted-by":"crossref","unstructured":"SufiF HanF KhalilI HuJ.A chaos\u2010based encryption technique to protect ECG packets for time critical telecardiology applications.Security and Communication Networks DOI:10.1002\/sec.226.","DOI":"10.1002\/sec.226"},{"key":"e_1_2_2_5_2","doi-asserted-by":"crossref","unstructured":"AgrafiotiF BuiFM HatzinakosD.Medical biometrics in mobile health monitoring.Security and Communication Networks DOI:10.1002\/sec.227.","DOI":"10.1002\/sec.227"},{"key":"e_1_2_2_6_2","doi-asserted-by":"crossref","unstructured":"LamHK HouZ YauWY ChenTP LiJ SimKY.A topological interpretation of fingerprint reference point.Security and Communication Networks DOI:10.1002\/sec.207.","DOI":"10.1002\/sec.207"},{"key":"e_1_2_2_7_2","doi-asserted-by":"crossref","unstructured":"BringerJ ChabanneH KindarjiB.Identification with encrypted biometric data.Security and Communication Networks DOI:10.1002\/sec.206.","DOI":"10.1002\/sec.206"},{"key":"e_1_2_2_8_2","doi-asserted-by":"crossref","unstructured":"ArakalaA HoradamKJ JeffersJ BoztasS.Protection of minutiae\u2010based templates using biocryptographic constructs in the set difference metric.Security and Communication Networks DOI:10.1002\/sec.205.","DOI":"10.1002\/sec.205"},{"key":"e_1_2_2_9_2","doi-asserted-by":"crossref","unstructured":"PrasadSM GovindanVK SathideviPS.Palmprint authentication using fusion of wavelet and contourlet features.Security and Communication Networks DOI:10.1002\/sec.234.","DOI":"10.1002\/sec.234"},{"key":"e_1_2_2_10_2","doi-asserted-by":"crossref","unstructured":"HouZ YauWY WangY.A review on fingerprint orientation estimation.Security and Communication Networks DOI:10.1002\/sec.209.","DOI":"10.1002\/sec.209"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.240","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.240","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T18:34:10Z","timestamp":1696703650000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.240"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,2]]},"references-count":9,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2011,5]]}},"alternative-id":["10.1002\/sec.240"],"URL":"https:\/\/doi.org\/10.1002\/sec.240","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2,2]]}}}