{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:53:10Z","timestamp":1730271190389,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/isbast.2014.7013095","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T14:34:53Z","timestamp":1421850893000},"page":"63-66","source":"Crossref","is-referenced-by-count":0,"title":["Using a biometric system to check-in and check-out luggage at airports"],"prefix":"10.1109","author":[{"given":"Robert T.","family":"Hans","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"24","author":"chirillo","year":"2003","journal-title":"Implementing Biometric Security"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-009-0218-1"},{"key":"18","article-title":"Honest it's me! Self-service verification","author":"coventry","year":"2003","journal-title":"ACM CHI Conference - Workshop on Human-computer Interaction and Security"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/WTS.2012.6266137"},{"key":"16","first-page":"111","article-title":"Biometrics in online assessments: A study case in high school students","author":"hern\ufffdndez","year":"2008","journal-title":"18th International Conference on Electronics Communications and Computers"},{"key":"13","article-title":"Biometric 2013 - The practical application of biometric technology","author":"biometric technology today","year":"2013","journal-title":"Biometrics Exhibition and Conference"},{"journal-title":"Bloomberg Website","year":"2014","key":"14"},{"journal-title":"Biometrics","year":"2014","key":"11"},{"journal-title":"The Emirates Webpage","year":"2012","key":"12"},{"journal-title":"RFID Business Case for Baggage Tagging","year":"2007","author":"iata","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ITHET.2005.1560332"},{"journal-title":"Navigating the Airport of Tomorrow","year":"2011","author":"rose","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.44"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.3103\/S0147688210020012"},{"key":"7","first-page":"20","article-title":"Fingerprint Identification","volume":"6","author":"marchenko","year":"2004","journal-title":"Elektron-ika Nauka Tehnologiya Biznes"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/328236.328110"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1023\/B:ETIN.0000006918.22060.1f"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-009-0218-1"},{"journal-title":"Using a Fingerprint Biometric System for Accessing and Exiting Vehicle Parking at Shopping Malls in South Africa","year":"0","author":"hans","key":"9"},{"journal-title":"Multi-biometric Approaches to Ear Biometrics and Soft Biometrics","year":"2010","author":"middendorff","key":"8"}],"event":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","start":{"date-parts":[[2014,8,26]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2014,8,27]]}},"container-title":["2014 International Symposium on Biometrics and Security Technologies (ISBAST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994953\/7013076\/07013095.pdf?arnumber=7013095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:29:17Z","timestamp":1490304557000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7013095\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isbast.2014.7013095","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}