{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T18:24:32Z","timestamp":1748456672922},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_31","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:02:28Z","timestamp":1577775748000},"page":"777-805","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Novel Session Key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics"],"prefix":"10.1007","author":[{"given":"Arpita","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"Binod Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"issue":"3","key":"31_CR1","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s11235-017-0345-9","volume":"67","author":"A Vipindev","year":"2018","unstructured":"Vipindev, A., & Gupta, B. (2018). Security in internet of things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67(3), 423\u2013441.","journal-title":"Telecommunication Systems"},{"key":"31_CR2","first-page":"666","volume-title":"Computer and cyber security: Principles, algorithm, applications, and perspectives","author":"B Gupta","year":"2018","unstructured":"Gupta, B. (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives (p. 666). Boca Raton, FL: CRC Press, Taylor & Francis."},{"key":"31_CR3","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"B Gupta","year":"2016","unstructured":"Gupta, B., Agrawal, D. P., & Shingo, Y. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Pennsylvania: IGI Global."},{"key":"31_CR4","volume-title":"Cryptography and network security: Principles and practice","author":"W Stallings","year":"2010","unstructured":"Stallings, W. (2010). Cryptography and network security: Principles and practice (5th ed.). Upper Saddle River, NJ: Prentice Hall.","edition":"5"},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11426639_9","volume-title":"Lecture Notes in Computer Science","author":"Xavier Boyen","year":"2005","unstructured":"Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., & Smith, A. (2005). Secure remote authentication using biometric data. In Eurocrypt. \nhttps:\/\/doi.org\/10.1007\/11426639_9"},{"unstructured":"Ueshige, Y., & Sakurai, K. (2006). A proposal of one-time biometric authentication. In: H. R. Arabnia, & S. Aissi, (Eds.) Security and Management.","key":"31_CR6"},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-79104-1_5","volume-title":"Information Security Practice and Experience","author":"Qiang Tang","year":"2008","unstructured":"Tang, Q., Bringer, J., Chabanne, H., & Pointcheval, D. (2008). A formal study of the privacy concerns in biometric-based remote authentication schemes. In Information Security Practice and Experience Conference (ISPEC). \nhttps:\/\/doi.org\/10.1007\/978-3-540-79104-1_5"},{"issue":"4","key":"31_CR8","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469\u2013472. \nhttps:\/\/doi.org\/10.1109\/TIT.1985.1057074\n\n.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"31_CR9","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/TIFS.2009.2031942","volume":"4","author":"C Fan","year":"2009","unstructured":"Fan, C., & Lin, Y. (2009). Provably secure remote truly three-factor authentication scheme. With privacy protection on biometrics. IEEE Transactions on Information Forensics and Security, 4(4), 933\u2013945. \nhttps:\/\/doi.org\/10.1109\/TIFS.2009.2031942\n\n.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"31_CR10","first-page":"338","volume":"4","author":"M Abid","year":"2009","unstructured":"Abid, M., & Afifi, H. (2009). Towards a secure e-passport protocol based on biometrics. Journal of Information Assurance and Security (JIAS), 4(4), 338\u2013345.","journal-title":"Journal of Information Assurance and Security (JIAS)"},{"doi-asserted-by":"publisher","unstructured":"Barni, M., Bianchi, T., Dario Catalano, M., di Raimondo, R. D. Labati, P. Failla, D. F., et al. (2010a). Privacy-preserving fingercode authentication. In: The 12th ACM Workshop on Multimedia and Security (MM&Sec10), Rome, Italy, Sept. \nhttps:\/\/doi.org\/10.1145\/1854229.1854270","key":"31_CR11","DOI":"10.1145\/1854229.1854270"},{"doi-asserted-by":"publisher","unstructured":"Barni, M., Bianchi, T., Catalano, D., di Raimondo, M., Labati, R. D., Failla, P., et al. (2010b). Privacy-preserving finger code authentication. In The12th ACM Workshop on Multimedia and Security (MM&Sec10), Rome, Italy. \nhttps:\/\/doi.org\/10.1145\/1854229.1854270","key":"31_CR12","DOI":"10.1145\/1854229.1854270"},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1007\/978-3-642-01793-3_91","volume-title":"Advances in Biometrics","author":"Maneesh Upmanyu","year":"2009","unstructured":"Upmanyu, M., Namboodiri, A. M., Srinathan, K., & Jawahar, C. V. (2009). Efficient biometric verification in encrypted domain. In International Conference on Biometrics (ICB). \nhttps:\/\/doi.org\/10.1007\/978-3-642-01793-3_91"},{"issue":"2","key":"31_CR14","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/TIFS.2010.2043188","volume":"5","author":"M Upmanyu","year":"2010","unstructured":"Upmanyu, M., Namboodiri, A. M., Srinathan, K., & Jawahar, C. V. (2010). Blind authentication: a secure crypto-biometric verification protocol. IEEE Transactions Information Forensics and Security, 5(2), 255\u2013268. \nhttps:\/\/doi.org\/10.1109\/TIFS.2010.2043188\n\n.","journal-title":"IEEE Transactions Information Forensics and Security"},{"key":"31_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73458-1","volume-title":"Information Security and Privacy","year":"2007","unstructured":"Bringer, J., Chabanne, H., Izabach\u00e8ne, M., Pointcheval, D., Tang, Q., & Zimmer, S. (2007). An application of the Goldwasser-Micali cryptosystem to biometric authentication. In The 12th Australasian Conference on Information Security and Privacy (ACISP\u201907). \nhttps:\/\/doi.org\/10.1007\/978-3-540-73458-1"},{"doi-asserted-by":"publisher","unstructured":"Scheirer, W. J., & Boult, T. E. (2008). Bio-cryptographic protocols with bipartite biotokens. In Biometric Symposium. \nhttps:\/\/doi.org\/10.1109\/BSYM.2008.4655516","key":"31_CR16","DOI":"10.1109\/BSYM.2008.4655516"},{"key":"31_CR17","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/978-3-642-01793-3_79","volume-title":"Advances in Biometrics","author":"W. J. Scheirer","year":"2009","unstructured":"Scheirer, W. J., & Boult, T. E. (2009). Bipartite biotokens: Definitions, implementation, and analysis. In International Conference on Biometrics (ICB). \nhttps:\/\/doi.org\/10.1007\/978-3-642-01793-3_79"},{"doi-asserted-by":"publisher","unstructured":"Boult, T. E., Scheirer, W. J., & Woodworth, R. (2007). Revocable fingerprint biotokens: Accuracy and security analysis. In IEEE Conference on Computer Vision and Pattern Recognition. \nhttps:\/\/doi.org\/10.1109\/CVPR.2007.383110","key":"31_CR18","DOI":"10.1109\/CVPR.2007.383110"},{"doi-asserted-by":"crossref","unstructured":"Juels, A., & Sudan, M. (2002). A fuzzy vault scheme. In A. Lapidoth, & E. Teletar (Eds.) Proceedings of IEEE International Symposium Information Theory (p. 408). Piscataway, NJ: IEEE Press","key":"31_CR19","DOI":"10.1109\/ISIT.2002.1023680"},{"issue":"1\/2","key":"31_CR20","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1504\/IJSN.2009.023424","volume":"4","author":"Ileana Buhan","year":"2009","unstructured":"Buhan, I., Doumen, J., Hartel, P., & Veldhuis, R. (2007). Secure Ad-hoc pairing with biometrics SAFE. Technical report, University of Twente. \nhttps:\/\/doi.org\/10.1504\/IJSN.2009.023424","journal-title":"International Journal of Security and Networks"},{"unstructured":"Buhan, I. (2008). Cryptographic keys from noisy data. Ph.D. thesis, University of Twente, Enschede, Netherlands.","key":"31_CR21"},{"key":"31_CR22","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.compeleceng.2016.11.01","volume":"64","author":"S Barman","year":"2016","unstructured":"Barman, S., Chattopadhyay, S., Samanta, D., & Gaurang, P. (2016). A novel secure key-exchange protocol using biometrics of the sender and receiver. Computer and Electrical Engineering, 64, 65. \nhttps:\/\/doi.org\/10.1016\/j.compeleceng.2016.11.01\n\n.","journal-title":"Computer and Electrical Engineering"},{"doi-asserted-by":"crossref","unstructured":"Sarkar, A, & Singh, B. (2018). Cryptographic key generation from cancelable fingerprint templates. In Proceedings of 4th IEEE International Conference on Recent Advances in Information Technology Proceedings of RAIT (Vol. 1).","key":"31_CR23","DOI":"10.1109\/RAIT.2018.8389007"},{"doi-asserted-by":"publisher","unstructured":"Sarkar, A., & Singh, A. (2017). Cancelable biometric based key generation for symmetric cryptography. In IEEE International Conference on Inventive Communication and Computational Technologies (pp. 404\u2013409). \nhttps:\/\/doi.org\/10.1109\/ICICCT.2017.7975186\n\n.","key":"31_CR24","DOI":"10.1109\/ICICCT.2017.7975186"},{"doi-asserted-by":"publisher","unstructured":"Barman, S., Chattopadhyay, S., & Samanta, D. (2014). In An Approach to Cryptographic Key Distribution Through Fingerprint Based Key Distribution Center, Advances in Computing, Communications and Informatics (ICACCI), 2014 International Conference on IEEE, 24\u201327 Sept. 2014, Delhi, India (pp. 1629\u20131635). \nhttps:\/\/doi.org\/10.1109\/ICACCI","key":"31_CR25","DOI":"10.1109\/ICACCI"},{"unstructured":"Barman, S., Samanta, D., & Chattopadhyay, S. (2014b). An approach of biometric based cryptographic key sharing. In International Conference on Communication and Computing (ICC), Bengaluru, India (pp. 151\u2013158).","key":"31_CR26"},{"unstructured":"Chakraborty, A., Datta, A., Nandi, P., Bar, P., Begum, S., & Barman, S. (2014). A proposed approach to generate revocable fingerprint template using Cartesian transformation. In Proceedings of 1st International Science and Technology Congress (IEMCONGRESS 2014), Kolkata, India (pp. 196-201).","key":"31_CR27"},{"issue":"3","key":"31_CR28","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1504\/IJBM.2015.071946","volume":"7","author":"S Barman","year":"2015","unstructured":"Barman, S., Samanta, D., & Chattopadhyay, S. (2015a). Approach to cryptographic key generation from fingerprint biometrics. International Journal of Biometrics, 7(3), 226\u2013248.","journal-title":"International Journal of Biometrics"},{"doi-asserted-by":"publisher","unstructured":"Barman, S., Samanta, D., & Chattopadhyay, S. (2015b). Revocable key generation from irrevocable biometric data for symmetric cryptography. In 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT) (pp. 1\u20134, 7\u20138 Feb). \nhttps:\/\/doi.org\/10.1109\/C3IT.2015.7060182","key":"31_CR29","DOI":"10.1109\/C3IT.2015.7060182"},{"key":"31_CR30","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/s13635-015-0020-1","volume":"1","author":"S Barman","year":"2015","unstructured":"Barman, S., Samanta, D., & Chattopadhyay, S. (2015c). Fingerprint-based crypto-biometric system for network security. EURASIP Journal on Information Security, 1, 3. \nhttps:\/\/doi.org\/10.1186\/s13635-015-0020-1\n\n.","journal-title":"EURASIP Journal on Information Security"},{"unstructured":"Andrew, R., Juan, S., James, N., Miles, S., Elaine, B., Stefan, L., et al. (2010). A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology Special Publication 800-22 revision 1a National Institute of Standards and Technology Special Publication 800- 131 p.","key":"31_CR31"},{"unstructured":"Kanade, S., Camara, D., Petrovska-Delacrtaz, D., & Dorizzi, B. (2009). Application of biometrics to obtain. High entropy cryptographic keys. In Proceedings of World Academy on Science, Engineering, and Technology, Hong Kong","key":"31_CR32"},{"unstructured":"Kanade, S., Petrovska-Delacretaz, D., & Dorizzi, B. (2010). Generating and sharing biometrics based session keys for secure cryptographic applications. In BTAS: IEEE International Conference on Biometrics: Theory, Applications and Systems (pp. 1\u20137).","key":"31_CR33"},{"issue":"9","key":"31_CR34","first-page":"1081","volume":"55","author":"F Hao","year":"2006","unstructured":"Hao, F., Anderson, R., & Daugman, J. (2006). Combining crypto with biometrics effectively. IEEETransComputer, 55(9), 1081\u20131088.","journal-title":"IEEETransComputer"},{"issue":"4","key":"31_CR35","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","volume":"2","author":"K Nandakumar","year":"2007","unstructured":"Nandakumar, K., Jain, A., & Pankanti, S. (2007). Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions Information Forensics Security, 2(4), 744\u2013757.","journal-title":"IEEE Transactions Information Forensics Security"},{"unstructured":"Nandakumar, K. (2013). BioSAKE: Biometrics-based secure authentication and key exchange. In Proceedings of 2013 International Conference on Biometrics (ICB) (pp. 1\u20138). Madrid, Spain: IEEE.","key":"31_CR36"},{"unstructured":"Nandakumar, K., & Jain, A. K. (2008). Multibiometric template security using fuzzy vault. In IEEE Second International Conference on Biometrics: Theory, Applications and Systems (pp. 1\u20136).","key":"31_CR37"},{"key":"31_CR38","first-page":"964","volume":"78","author":"S Christos","year":"2016","unstructured":"Christos, S., Psannis, K. E., Kim, B.-G., & Gupta, B. (2016). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964\u2013975.","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"31_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJCAC.2017070101","volume":"7","author":"S Gupta","year":"2017","unstructured":"Gupta, S., & Gupta, B. B. (2017). Detection: Avoidance, and attack pattern mechanisms in modern web application vulnerabilities: Present and future challenges. International Journal of Cloud Applications and Computing (IJCAC), 7(3), 1\u201343.","journal-title":"International Journal of Cloud Applications and Computing (IJCAC)"},{"doi-asserted-by":"crossref","unstructured":"Sarkar, A., Singh, B., & Bhaumik, U. (2017) Cryptographic key generation scheme from cancelable biometrics. In ICCCAN-2017 (Indexed by Scopus). Progress in Computing, Analytics and Networking, Proceedings of ICCAN.","key":"31_CR40","DOI":"10.1007\/978-981-10-7871-2_26"},{"doi-asserted-by":"publisher","unstructured":"Boyen, X. (2004). Reusable cryptographic fuzzy extractors. In 11th ACM Conference on Computer and Communications Security (CCS). \nhttps:\/\/doi.org\/10.1145\/1030083.1030096\n\n.","key":"31_CR41","DOI":"10.1145\/1030083.1030096"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:07:39Z","timestamp":1577776059000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_31","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}