Biometrische Zugangskontrolle mit Smartphones View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2014-07

AUTHORS

Christoph Busch

ABSTRACT

Die Verbreitung von Smartphones und deren verbesserten Eigenschaften hinsichtlich der Rechenleistung und in Bezug auf Qualität und Vielfalt der eingebauten Sensoren (Kamera, Mikrophon, etc.) motivieren die Entwicklung von biometrischen Verfahren für diese persönlichen Endgeräte. Neue Nutzungsszenarien reichen von Near Field Communication (NFC) für die physikalische Zutrittskontrolle bis zum Mobilen Payment. Der Erkennung von Angriffen auf die eingesetzten Sensoren gilt eine besondere Aufmerksamkeit. More... »

PAGES

475-481

References to SciGraph publications

Journal

TITLE

Datenschutz und Datensicherheit - DuD

ISSUE

7

VOLUME

38

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s11623-014-0210-x

DOI

http://dx.doi.org/10.1007/s11623-014-0210-x

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1006219522


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "author": [
      {
        "affiliation": {
          "name": [
            "Darmstadt, Deutschland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Busch", 
        "givenName": "Christoph", 
        "id": "sg:person.011143356603.69", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011143356603.69"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/s11623-009-0085-4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020065837", 
          "https://doi.org/10.1007/s11623-009-0085-4"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-06749-0_12", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1048017673", 
          "https://doi.org/10.1007/978-3-319-06749-0_12"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tcsvt.2003.818350", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061574496"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iwbf.2014.6914249", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094017368"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/ccst.2000.891168", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094379149"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icb.2012.6199798", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095348596"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2014-07", 
    "datePublishedReg": "2014-07-01", 
    "description": "Die Verbreitung von Smartphones und deren verbesserten Eigenschaften hinsichtlich der Rechenleistung und in Bezug auf Qualit\u00e4t und Vielfalt der eingebauten Sensoren (Kamera, Mikrophon, etc.) motivieren die Entwicklung von biometrischen Verfahren f\u00fcr diese pers\u00f6nlichen Endger\u00e4te. Neue Nutzungsszenarien reichen von Near Field Communication (NFC) f\u00fcr die physikalische Zutrittskontrolle bis zum Mobilen Payment. Der Erkennung von Angriffen auf die eingesetzten Sensoren gilt eine besondere Aufmerksamkeit.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1007/s11623-014-0210-x", 
    "inLanguage": [
      "de"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": [
      {
        "id": "sg:journal.1136248", 
        "issn": [
          "1614-0702", 
          "1862-2607"
        ], 
        "name": "Datenschutz und Datensicherheit - DuD", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "7", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "38"
      }
    ], 
    "name": "Biometrische Zugangskontrolle mit Smartphones", 
    "pagination": "475-481", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "1da0715b51f1803179a7efc2162b773809163a4e260fb8caeb9cabe64b2997fa"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s11623-014-0210-x"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1006219522"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s11623-014-0210-x", 
      "https://app.dimensions.ai/details/publication/pub.1006219522"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-11T12:43", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000363_0000000363/records_70064_00000000.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://link.springer.com/10.1007%2Fs11623-014-0210-x"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11623-014-0210-x'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11623-014-0210-x'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11623-014-0210-x'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11623-014-0210-x'


 

This table displays all metadata directly associated to this object as RDF triples.

72 TRIPLES      20 PREDICATES      31 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s11623-014-0210-x schema:author N81f9a02c5a194333a27f4c74cee32596
2 schema:citation sg:pub.10.1007/978-3-319-06749-0_12
3 sg:pub.10.1007/s11623-009-0085-4
4 https://doi.org/10.1109/ccst.2000.891168
5 https://doi.org/10.1109/icb.2012.6199798
6 https://doi.org/10.1109/iwbf.2014.6914249
7 https://doi.org/10.1109/tcsvt.2003.818350
8 schema:datePublished 2014-07
9 schema:datePublishedReg 2014-07-01
10 schema:description Die Verbreitung von Smartphones und deren verbesserten Eigenschaften hinsichtlich der Rechenleistung und in Bezug auf Qualität und Vielfalt der eingebauten Sensoren (Kamera, Mikrophon, etc.) motivieren die Entwicklung von biometrischen Verfahren für diese persönlichen Endgeräte. Neue Nutzungsszenarien reichen von Near Field Communication (NFC) für die physikalische Zutrittskontrolle bis zum Mobilen Payment. Der Erkennung von Angriffen auf die eingesetzten Sensoren gilt eine besondere Aufmerksamkeit.
11 schema:genre research_article
12 schema:inLanguage de
13 schema:isAccessibleForFree false
14 schema:isPartOf N686c954418a3450cb815887b1de04d14
15 Nc5d83c83c20c4c54924d98c369849de9
16 sg:journal.1136248
17 schema:name Biometrische Zugangskontrolle mit Smartphones
18 schema:pagination 475-481
19 schema:productId N2853e6bf853f462d9d157df8b655e4c1
20 N4df0ccd8276e437d9f41b4eedfd761ae
21 N54854bb8bcba407880bc1d0fa52147cf
22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006219522
23 https://doi.org/10.1007/s11623-014-0210-x
24 schema:sdDatePublished 2019-04-11T12:43
25 schema:sdLicense https://scigraph.springernature.com/explorer/license/
26 schema:sdPublisher Nbc10ee48c67c434da968ad294a558329
27 schema:url https://link.springer.com/10.1007%2Fs11623-014-0210-x
28 sgo:license sg:explorer/license/
29 sgo:sdDataset articles
30 rdf:type schema:ScholarlyArticle
31 N2853e6bf853f462d9d157df8b655e4c1 schema:name readcube_id
32 schema:value 1da0715b51f1803179a7efc2162b773809163a4e260fb8caeb9cabe64b2997fa
33 rdf:type schema:PropertyValue
34 N4714930cbc0248c88cfda139df8ccee9 schema:name Darmstadt, Deutschland
35 rdf:type schema:Organization
36 N4df0ccd8276e437d9f41b4eedfd761ae schema:name doi
37 schema:value 10.1007/s11623-014-0210-x
38 rdf:type schema:PropertyValue
39 N54854bb8bcba407880bc1d0fa52147cf schema:name dimensions_id
40 schema:value pub.1006219522
41 rdf:type schema:PropertyValue
42 N686c954418a3450cb815887b1de04d14 schema:issueNumber 7
43 rdf:type schema:PublicationIssue
44 N81f9a02c5a194333a27f4c74cee32596 rdf:first sg:person.011143356603.69
45 rdf:rest rdf:nil
46 Nbc10ee48c67c434da968ad294a558329 schema:name Springer Nature - SN SciGraph project
47 rdf:type schema:Organization
48 Nc5d83c83c20c4c54924d98c369849de9 schema:volumeNumber 38
49 rdf:type schema:PublicationVolume
50 sg:journal.1136248 schema:issn 1614-0702
51 1862-2607
52 schema:name Datenschutz und Datensicherheit - DuD
53 rdf:type schema:Periodical
54 sg:person.011143356603.69 schema:affiliation N4714930cbc0248c88cfda139df8ccee9
55 schema:familyName Busch
56 schema:givenName Christoph
57 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011143356603.69
58 rdf:type schema:Person
59 sg:pub.10.1007/978-3-319-06749-0_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048017673
60 https://doi.org/10.1007/978-3-319-06749-0_12
61 rdf:type schema:CreativeWork
62 sg:pub.10.1007/s11623-009-0085-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020065837
63 https://doi.org/10.1007/s11623-009-0085-4
64 rdf:type schema:CreativeWork
65 https://doi.org/10.1109/ccst.2000.891168 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094379149
66 rdf:type schema:CreativeWork
67 https://doi.org/10.1109/icb.2012.6199798 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095348596
68 rdf:type schema:CreativeWork
69 https://doi.org/10.1109/iwbf.2014.6914249 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094017368
70 rdf:type schema:CreativeWork
71 https://doi.org/10.1109/tcsvt.2003.818350 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061574496
72 rdf:type schema:CreativeWork
 




Preview window. Press ESC to close (or click here)


...