{"id":"https://openalex.org/W1537810930","doi":"https://doi.org/10.1109/civemsa.2015.7158611","title":"Improving fingerprint based access control system using quick response code","display_name":"Improving fingerprint based access control system using quick response code","publication_year":2015,"publication_date":"2015-06-01","ids":{"openalex":"https://openalex.org/W1537810930","doi":"https://doi.org/10.1109/civemsa.2015.7158611","mag":"1537810930"},"language":"en","primary_location":{"id":"doi:10.1109/civemsa.2015.7158611","is_oa":false,"landing_page_url":"https://doi.org/10.1109/civemsa.2015.7158611","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053638651","display_name":"Xiangpeng Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangpeng Fu","raw_affiliation_strings":["School of Computer Science, Inner Mongolia University, Hohhot, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Inner Mongolia University, Hohhot, China","institution_ids":["https://openalex.org/I2722730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003662207","display_name":"Kaiying Feng","orcid":null},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaiying Feng","raw_affiliation_strings":["School of Computer Science, Inner Mongolia University, Hohhot, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Inner Mongolia University, Hohhot, China","institution_ids":["https://openalex.org/I2722730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046311971","display_name":"Changzhong Wang","orcid":"https://orcid.org/0000-0002-4136-2433"},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changzhong Wang","raw_affiliation_strings":["School of Computer Science, Inner Mongolia University, Hohhot, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Inner Mongolia University, Hohhot, China","institution_ids":["https://openalex.org/I2722730"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102757426","display_name":"Junxing Zhang","orcid":"https://orcid.org/0000-0003-4176-0914"},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junxing Zhang","raw_affiliation_strings":["School of Computer Science, Inner Mongolia University, Hohhot, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Inner Mongolia University, Hohhot, China","institution_ids":["https://openalex.org/I2722730"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5053638651"],"corresponding_institution_ids":["https://openalex.org/I2722730"],"apc_list":null,"apc_paid":null,"fwci":1.5892,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.86916428,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7967649698257446},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7282862067222595},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6865320205688477},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.6803379058837891},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.64581298828125},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6422736644744873},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.612449586391449},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.5250025987625122},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5235307216644287},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5008890628814697},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.4951540529727936},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.4463125467300415},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.416413277387619},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35234761238098145},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.3082852363586426},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.22880995273590088},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17191225290298462}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7967649698257446},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7282862067222595},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6865320205688477},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.6803379058837891},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.64581298828125},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6422736644744873},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.612449586391449},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.5250025987625122},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5235307216644287},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5008890628814697},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.4951540529727936},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.4463125467300415},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.416413277387619},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35234761238098145},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.3082852363586426},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.22880995273590088},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17191225290298462},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/civemsa.2015.7158611","is_oa":false,"landing_page_url":"https://doi.org/10.1109/civemsa.2015.7158611","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1552426232","https://openalex.org/W1996360405","https://openalex.org/W1996386389","https://openalex.org/W2006664424","https://openalex.org/W2038515238","https://openalex.org/W2065770906","https://openalex.org/W2085106103","https://openalex.org/W2119235753","https://openalex.org/W2119363962","https://openalex.org/W2130817593","https://openalex.org/W4232836212","https://openalex.org/W4234457150","https://openalex.org/W6633257874","https://openalex.org/W6651801126"],"related_works":["https://openalex.org/W2093798919","https://openalex.org/W3101929529","https://openalex.org/W2907262898","https://openalex.org/W2393298610","https://openalex.org/W2050433615","https://openalex.org/W3022695109","https://openalex.org/W2360165953","https://openalex.org/W2352114587","https://openalex.org/W4253316174","https://openalex.org/W2390304521"],"abstract_inverted_index":{"Access":[0],"control":[1,16,66,89],"systems":[2,21,67],"have":[3,162],"been":[4],"widely":[5],"used":[6],"in":[7,129,157,170],"physical":[8],"security":[9],"to":[10,37,47,60,125,133,143,147,183,191],"authenticate":[11],"the":[12,26,30,38,84,117,122,130,152,158,164,167,171,177],"passing":[13],"people":[14],"and":[15,96,121,188,196],"their":[17],"entrance.":[18],"The":[19,112,136],"existing":[20],"can":[22,57,75],"be":[23,58,76],"classified":[24],"into":[25],"fingerprint":[27,86],"based":[28,33,87,105],"system,":[29,34],"proximity":[31,43],"card":[32],"etc.":[35],"according":[36],"adopted":[39],"authentication":[40,73,94,114,187,195],"techniques.":[41],"However,":[42],"cards":[44],"are":[45,104],"easy":[46],"lose,":[48],"while":[49],"fingerprints":[50],"also":[51],"become":[52],"less":[53],"reliable":[54],"because":[55],"they":[56],"copied":[59],"make":[61],"fakes.":[62],"It":[63],"appears":[64],"access":[65,88,146],"relying":[68],"on":[69,106],"only":[70],"one":[71],"single":[72],"technique":[74],"really":[77],"risky.":[78],"In":[79],"this":[80],"paper,":[81],"we":[82],"improve":[83],"traditional":[85],"system":[90,169],"with":[91],"an":[92],"additional":[93],"process":[95,115],"a":[97,126,140],"remote":[98,141],"authorization":[99,137,154],"scheme,":[100],"both":[101,193],"of":[102,166],"which":[103],"Quick":[107],"Response":[108],"Code":[109],"(QR":[110],"code).":[111],"second":[113],"leverages":[116],"one-time":[118],"password":[119],"(OTP)":[120],"personalized":[123],"response":[124],"challenge":[127],"contained":[128],"QR":[131,159],"code":[132],"enhance":[134],"security.":[135],"scheme":[138],"assists":[139],"manager":[142],"grant":[144],"temporary":[145],"otherwise":[148],"unauthorized":[149],"personnel":[150],"using":[151],"time-stamped":[153],"information":[155],"stored":[156],"code.":[160],"We":[161],"implemented":[163],"prototype":[165,178],"proposed":[168],".NET":[172],"framework.":[173],"Our":[174],"experiments":[175],"show":[176],"takes":[179],"about":[180],"77":[181],"ms":[182,190],"offer":[184],"more":[185],"rigorous":[186],"134":[189],"provide":[192],"strengthened":[194],"authorization.":[197]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
