{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:26:32Z","timestamp":1725549992363},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540291138"},{"type":"electronic","value":"9783540319986"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11560326_35","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:29:26Z","timestamp":1127831366000},"page":"430-435","source":"Crossref","is-referenced-by-count":0,"title":["Encoding Private Key in Fingerprint"],"prefix":"10.1007","author":[{"given":"Ern\u0151","family":"Jeges","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zolt\u00e1n","family":"Horn\u00e1k","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Csaba","family":"K\u00f6rm\u00f6czi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Bodo, A.: Method of producing a digital signature with aid of biometric feature, German Pat"},{"key":"35_CR2","unstructured":"Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.K.V.: Biometric Encryption, \n                    \n                      http:\/\/www.bioscrypt.com\/assets\/Biometric_Encryption.pdf"},{"key":"35_CR3","unstructured":"Hefferman, S.: The Role of Biometrics within Document Security, TSSI Swindon, United Kingdom (1999), \n                    \n                      http:\/\/www.afb.org.uk\/downloads\/pisec.pdf"},{"key":"35_CR4","unstructured":"Lewis, J.W.: Biometrics for Secure Identity Verification: Trends and Developments. University of Maryland (2001-2002), \n                    \n                      http:\/\/faculty.ed.umuc.edu\/~meinkej\/inss690\/lewis.pdf"},{"key":"35_CR5","unstructured":"Secure Personal Identification Systems: Policy, Process and Technology Choices for a Privacy-Sensitive Solution, A Smart Card Alliance White Paper (2002), \n                    \n                      http:\/\/www.ibia.org\/membersadmin\/whitepapers\/pdf\/11\/secure_id_white_paper.pdf"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Berrou, C., Glavieux, A., Thitimajshima, P.: Near Shannon limit error-correcting coding and decoding: turbo codes. In: ICC Proceedings (1993)","DOI":"10.1109\/ICC.1993.397441"},{"key":"35_CR7","unstructured":"Ottoson, T., Agrell, E.: Deconding Convolutional Codes (2003), \n                    \n                      http:\/\/www.s2.chalmers.se\/graduate\/courses\/errctrlcoding\/convcode_decoding.pdf"},{"key":"35_CR8","unstructured":"Zhu, G.: Performance Evaluation of Turbo Codes. Queen\u2019s University, Kingston, Ontario, Canada (1998), \n                    \n                      http:\/\/markov.mast.queensu.ca\/Papers\/zhu_proj98.ps"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11560326_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:12:57Z","timestamp":1619507577000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11560326_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540291138","9783540319986"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/11560326_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}