{"id":"https://openalex.org/W3210479750","doi":"https://doi.org/10.1109/ccci52664.2021.9583219","title":"A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System","display_name":"A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System","publication_year":2021,"publication_date":"2021-10-15","ids":{"openalex":"https://openalex.org/W3210479750","doi":"https://doi.org/10.1109/ccci52664.2021.9583219","mag":"3210479750"},"language":"en","primary_location":{"id":"doi:10.1109/ccci52664.2021.9583219","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccci52664.2021.9583219","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112485581","display_name":"Muhammad Ayaz Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I121243025","display_name":"International Islamic University, Islamabad","ror":"https://ror.org/047w75g40","country_code":"PK","type":"education","lineage":["https://openalex.org/I121243025"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Muhammad Ayaz Khan","raw_affiliation_strings":["Department of CS&SE, International Islamic University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of CS&SE, International Islamic University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I121243025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067577291","display_name":"Anwar Ghani","orcid":"https://orcid.org/0000-0001-7474-0405"},"institutions":[{"id":"https://openalex.org/I121243025","display_name":"International Islamic University, Islamabad","ror":"https://ror.org/047w75g40","country_code":"PK","type":"education","lineage":["https://openalex.org/I121243025"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Anwar Ghani","raw_affiliation_strings":["Department of CS&SE, International Islamic University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of CS&SE, International Islamic University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I121243025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051195514","display_name":"Mohammad S. Obaidat","orcid":"https://orcid.org/0000-0002-1569-9657"},"institutions":[{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohammad S. Obaidat","raw_affiliation_strings":["College of Computing and Informatics, University of Sharjah, Sharjah 27272, UAE"],"affiliations":[{"raw_affiliation_string":"College of Computing and Informatics, University of Sharjah, Sharjah 27272, UAE","institution_ids":["https://openalex.org/I29891158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028044712","display_name":"Pandi Vijayakumar","orcid":"https://orcid.org/0000-0001-5451-8946"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pandi Vijayakumar","raw_affiliation_strings":["Department of Computer Science and Engineering, University College of Engineering Tindivanam, Tindivanam, Tamil Nadu 604001, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University College of Engineering Tindivanam, Tindivanam, Tamil Nadu 604001, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031238156","display_name":"Khwaja Mansoor","orcid":"https://orcid.org/0000-0002-9045-8693"},"institutions":[{"id":"https://openalex.org/I899713450","display_name":"Air University","ror":"https://ror.org/03yfe9v83","country_code":"PK","type":"education","lineage":["https://openalex.org/I899713450"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Khwaja Mansoor","raw_affiliation_strings":["Department of Computer Science, Air University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Air University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I899713450"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047048551","display_name":"Shehzad Ashraf Chaudhry","orcid":"https://orcid.org/0000-0002-9321-6956"},"institutions":[{"id":"https://openalex.org/I4210091267","display_name":"Geli\u015fim \u00dcniversitesi","ror":"https://ror.org/0188hvh39","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210091267"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Shehzad Ashraf Chaudhry","raw_affiliation_strings":["Department of Computer Engineering, Istanbul Gelisim University, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Istanbul Gelisim University, Istanbul, Turkey","institution_ids":["https://openalex.org/I4210091267"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5112485581"],"corresponding_institution_ids":["https://openalex.org/I121243025"],"apc_list":null,"apc_paid":null,"fwci":0.3843,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.61687908,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"60","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7124369740486145},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7093786597251892},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5812842845916748},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.573702871799469},{"id":"https://openalex.org/keywords/digital-rights-management","display_name":"Digital rights management","score":0.5662752389907837},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5330459475517273},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.5317341685295105},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4512072503566742},{"id":"https://openalex.org/keywords/digital-content","display_name":"Digital content","score":0.41909876465797424},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.15491634607315063}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7124369740486145},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7093786597251892},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5812842845916748},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.573702871799469},{"id":"https://openalex.org/C537843408","wikidata":"https://www.wikidata.org/wiki/Q192532","display_name":"Digital rights management","level":2,"score":0.5662752389907837},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5330459475517273},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.5317341685295105},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4512072503566742},{"id":"https://openalex.org/C2779344036","wikidata":"https://www.wikidata.org/wiki/Q11320476","display_name":"Digital content","level":2,"score":0.41909876465797424},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.15491634607315063},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccci52664.2021.9583219","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccci52664.2021.9583219","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W783730523","https://openalex.org/W1482746299","https://openalex.org/W1590647008","https://openalex.org/W2045162763","https://openalex.org/W2059212242","https://openalex.org/W2083074921","https://openalex.org/W2103401900","https://openalex.org/W2110790816","https://openalex.org/W2540918362","https://openalex.org/W2557978403","https://openalex.org/W2593086630","https://openalex.org/W2609102187","https://openalex.org/W2735601075","https://openalex.org/W2743834871","https://openalex.org/W2810817087","https://openalex.org/W2954321248","https://openalex.org/W2969264604","https://openalex.org/W2989729843","https://openalex.org/W3007982721","https://openalex.org/W3017054338","https://openalex.org/W3036530244","https://openalex.org/W3046431792","https://openalex.org/W3092188219","https://openalex.org/W3094038034","https://openalex.org/W3095624109","https://openalex.org/W3116654836","https://openalex.org/W3132109559","https://openalex.org/W3156079496","https://openalex.org/W3182610859","https://openalex.org/W6781362834","https://openalex.org/W6793906440"],"related_works":["https://openalex.org/W1998008603","https://openalex.org/W1562323537","https://openalex.org/W1972536982","https://openalex.org/W1972406709","https://openalex.org/W2736718217","https://openalex.org/W4238646005","https://openalex.org/W2063703515","https://openalex.org/W2089395279","https://openalex.org/W2082791829","https://openalex.org/W2548502206"],"abstract_inverted_index":{"As":[0],"digital":[1,15,40,62],"content":[2,16],"transmission":[3],"through":[4,143],"the":[5,12,52,55,149,164,171,178],"internet":[6],"is":[7,17,80,126,134,141,151,167],"convenient":[8],"and":[9,26,31,58,74,78,99,138,157,174],"quick,":[10],"so":[11],"outspread":[13],"of":[14,39,60,70,95,148],"very":[18],"high.":[19],"However,":[20],"along":[21],"with":[22,36,170],"this":[23,129],"incredible":[24],"speed":[25],"ease,":[27],"current":[28],"communication":[29,158,175],"technologies":[30],"computers":[32],"have":[33],"also":[34,105,152],"brought":[35],"them":[37],"plenty":[38],"rights":[41],"management":[42],"complications.":[43],"Digital":[44,122],"Rights":[45,123],"Management":[46,124],"Systems":[47],"are":[48,85],"designed":[49,165],"to":[50,54,87],"limit":[51],"access":[53],"utilization,":[56],"alternation,":[57],"distribution":[59],"persevered":[61],"content.":[63],"This":[64],"article":[65],"scrutinized":[66],"two":[67],"recent":[68],"schemes":[69,84],"Lee":[71],"et":[72,76],"al.":[73,77],"Yu":[75],"it":[79],"found":[81],"that":[82,163],"these":[83,112],"suspected":[86],"an":[88],"insider":[89],"attack,":[90,93,98],"stolen":[91],"smart-card":[92],"Daniel":[94],"services":[96],"(Dos)":[97],"impersonation":[100],"attack.":[101],"Furthermore,":[102],"their":[103],"proposal":[104],"suffers":[106],"from":[107],"incorrect":[108],"issues.":[109],"To":[110],"fix":[111],"flaws,":[113],"a":[114],"robust":[115],"anonymous":[116],"authentication":[117],"scheme":[118,133,150,166],"using":[119,154],"biometrics":[120],"for":[121,136],"System":[125],"proposed":[127,132],"in":[128],"article.":[130],"The":[131,146,160],"checked":[135],"correctness":[137],"its":[139],"security":[140],"proved":[142],"BAN":[144],"logic.":[145],"performance":[147],"analyzed":[153],"computation":[155,173],"time":[156],"time.":[159],"results":[161],"show":[162],"highly":[168],"secure":[169],"same":[172],"cost":[176],"as":[177],"existing":[179],"protocols.":[180]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
