{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T10:24:27Z","timestamp":1750328667549,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030582005"},{"type":"electronic","value":"9783030582012"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58201-2_20","type":"book-chapter","created":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T23:02:29Z","timestamp":1600038149000},"page":"295-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fuzzy Vault for Behavioral Authentication System"],"prefix":"10.1007","author":[{"given":"Md Morshedul","family":"Islam","sequence":"first","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"issue":"4","key":"20_CR1","first-page":"671","volume":"66","author":"D Achlioptas","year":"2003","unstructured":"Achlioptas, D.: Database-friendly random projections: Johnson-Lindenstrauss with binary coins. JCSS 66(4), 671\u2013687 (2003)","journal-title":"JCSS"},{"key":"20_CR2","series-title":"NATO ASI Series (Series F: Computer and Systems Sciences)","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-642-77489-8_5","volume-title":"Combinatorial Optimization","author":"M Akg\u00fcl","year":"1992","unstructured":"Akg\u00fcl, M.: The linear assignment problem. In: Akg\u00fcl, M., Hamacher, H.W., T\u00fcfek\u00e7i, S. (eds.) Combinatorial Optimization. NATO ASI Series (Series F: Computer and Systems Sciences), vol. 82, pp. 85\u2013122. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/978-3-642-77489-8_5"},{"key":"20_CR3","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-319-28865-9_26","volume-title":"Security and Privacy in Communication Networks","author":"M Alimomeni","year":"2015","unstructured":"Alimomeni, M., Safavi-Naini, R.: How to prevent to delegate authentication. In: Thuraisingham, B., Wang, X.F., Yegneswaran, V. (eds.) SecureComm 2015. LNICST, vol. 164, pp. 477\u2013499. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-28865-9_26"},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"987","DOI":"10.2307\/2529826","volume":"31","author":"MB Brown","year":"1975","unstructured":"Brown, M.B.: A method for combining non-independent, one-sided tests of significance. Biometrics 31, 987\u2013992 (1975)","journal-title":"Biometrics"},{"doi-asserted-by":"crossref","unstructured":"Chang, E.C., et al.: Finding the original point set hidden among chaff. In: Proceedings of the ASIACCS 2006, pp. 182\u2013188. ACM (2006)","key":"20_CR5","DOI":"10.1145\/1128817.1128845"},{"doi-asserted-by":"crossref","unstructured":"Clancy, T.C., et al.: Secure smartcardbased fingerprint authentication. In: Proceedings of the ACM SIGMM WBMA 2003, pp. 45\u201352. ACM (2003)","key":"20_CR6","DOI":"10.1145\/982507.982516"},{"issue":"3","key":"20_CR7","doi-asserted-by":"publisher","first-page":"e57410","DOI":"10.1371\/journal.pone.0057410","volume":"8","author":"MJ Crump","year":"2013","unstructured":"Crump, M.J., et al.: Evaluating Amazon\u2019s mechanical turk as a tool for experimental behavioral research. PLoS One 8(3), e57410 (2013)","journal-title":"PLoS One"},{"issue":"1","key":"20_CR8","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank, M., et al.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136\u2013148 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR9","volume-title":"Statistical Concepts: A Second Course","author":"DL Hahs-Vaughn","year":"2013","unstructured":"Hahs-Vaughn, D.L., et al.: Statistical Concepts: A Second Course. Routledge, Abingdon (2013)"},{"doi-asserted-by":"crossref","unstructured":"Islam, M.M., et al.: Poster: a behavioural authentication system for mobile users. In: Proceedings of the ACM CCS 2016, pp. 1742\u20131744. ACM (2016)","key":"20_CR10","DOI":"10.1145\/2976749.2989065"},{"doi-asserted-by":"crossref","unstructured":"Massey, Jr., Frank, J., et al.: The Kolmogorov-Smirnov test for goodness of fit. JASA 46(253), 68\u201378 (1951)","key":"20_CR11","DOI":"10.1080\/01621459.1951.10500769"},{"issue":"2","key":"20_CR12","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels, A., et al.: A fuzzy vault scheme. Des. Codes Crypt. 38(2), 237\u2013257 (2006). https:\/\/doi.org\/10.1007\/s10623-005-6343-z","journal-title":"Des. Codes Crypt."},{"doi-asserted-by":"crossref","unstructured":"Kaur, M., et al.: Fuzzy vault template protection for multimodal biometric system. In: Proceedings of the ICCCA 2017, pp. 1131\u20131135. IEEE (2017)","key":"20_CR13","DOI":"10.1109\/CCAA.2017.8229966"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1007\/978-3-540-74549-5_84","volume-title":"Advances in Biometrics","author":"YJ Lee","year":"2007","unstructured":"Lee, Y.J., Bae, K., Lee, S.J., Park, K.R., Kim, J.: Biometric key binding: fuzzy vault based on iris images. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 800\u2013808. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74549-5_84"},{"issue":"3","key":"20_CR15","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1109\/TIFS.2015.2505630","volume":"11","author":"C Li","year":"2015","unstructured":"Li, C., et al.: A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures. IEEE Trans. Inf. Forensics Secur. 11(3), 543\u2013555 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR16","volume-title":"The Story of Mathematics","author":"R Mankiewicz","year":"2000","unstructured":"Mankiewicz, R.: The Story of Mathematics. Cassell, London (2000)"},{"issue":"4","key":"20_CR17","first-page":"744","volume":"2","author":"K Nandakumar","year":"2007","unstructured":"Nandakumar, K., et al.: Fingerprint-based fuzzy vault: implementation and performance. IEEE TIFS 2(4), 744\u2013757 (2007)","journal-title":"IEEE TIFS"},{"unstructured":"Salowey, J.A., et al.: TLS 1.3, 10 August 2018. https:\/\/www.ietf.org\/blog\/tls13\/. Accessed 22 Apr 2019","key":"20_CR18"},{"doi-asserted-by":"crossref","unstructured":"Scheirer, W.J., et al.: Cracking fuzzy vaults and biometric encryption. In: Biometrics Symposium 2007, pp. 1\u20136. IEEE (2007)","key":"20_CR19","DOI":"10.1109\/BCC.2007.4430534"},{"key":"20_CR20","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-319-58469-0_32","volume-title":"ICT Systems Security and Privacy Protection","author":"S Taheri","year":"2017","unstructured":"Taheri, S., Islam, M.M., Safavi-Naini, R.: Privacy-enhanced profile-based authentication using sparse random projection. In: De Capitani di Vimercati, S., Martinelli, F. (eds.) SEC 2017. IAICT, vol. 502, pp. 474\u2013490. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58469-0_32"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/11527923_32","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"U Uludag","year":"2005","unstructured":"Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310\u2013319. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11527923_32"},{"unstructured":"Uludag, U., et al.: Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of the CVPRW 2006. pp, 163\u2013163. IEEE (2006)","key":"20_CR22"},{"key":"20_CR23","doi-asserted-by":"publisher","DOI":"10.1090\/dimacs\/065","volume-title":"The Random Projection Method","author":"SS Vempala","year":"2005","unstructured":"Vempala, S.S.: The Random Projection Method, vol. 65. American Mathematical Society, Providence (2005)"},{"doi-asserted-by":"crossref","unstructured":"Wu, L., et al.: A face based fuzzy vault scheme for secure online authentication. In: Proceedings of the ISDPE 2010, pp. 45\u201349. IEEE (2010)","key":"20_CR24","DOI":"10.1109\/ISDPE.2010.13"},{"doi-asserted-by":"crossref","unstructured":"Yampolskiy, R.V.: Mimicry attack on strategy-based behavioral biometric. In: Proceedings of the ITNG 2008, pp. 916\u2013921. IEEE (2008)","key":"20_CR25","DOI":"10.1109\/ITNG.2008.78"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58201-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T00:07:57Z","timestamp":1726272477000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58201-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030582005","9783030582012"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58201-2_20","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2020.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.88","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.14","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}