{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:49:21Z","timestamp":1743018561521,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030940287"},{"type":"electronic","value":"9783030940294"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-94029-4_7","type":"book-chapter","created":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T03:02:48Z","timestamp":1641870168000},"page":"97-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Method of Template Protection and Two-Factor Authentication Protocol Based on Biometric and PUF"],"prefix":"10.1007","author":[{"given":"Hui","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Weixin","family":"Bian","sequence":"additional","affiliation":[]},{"given":"Biao","family":"Jie","sequence":"additional","affiliation":[]},{"given":"Shuwan","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,11]]},"reference":[{"issue":"11","key":"7_CR1","first-page":"3403","volume":"53","author":"N Kumar","year":"2020","unstructured":"Kumar, N.: Cancelable biometrics: a comprehensive survey. Artif. Intell. Rev. 53(11), 3403\u201334462 (2020)","journal-title":"Artif. Intell. Rev."},{"issue":"12","key":"7_CR2","doi-asserted-by":"publisher","first-page":"9559","DOI":"10.1109\/TIE.2019.2893831","volume":"66","author":"Y Zheng","year":"2019","unstructured":"Zheng, Y., Cao, Y., Chang, C.H.: UDhashing: physical unclonable function-based user-device hash for endpoint authentication. IEEE Trans. Industr. Electron. 66(12), 9559\u20139570 (2019)","journal-title":"IEEE Trans. Industr. Electron."},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.future.2020.03.034","volume":"109","author":"W Bian","year":"2020","unstructured":"Bian, W., Gope, P., Cheng, Y., Li, Q.: Bio-AKA: an efficient fingerprint based two factor user authentication and key agreement scheme. Future Gener. Comput. Syst. 109, 45\u201355 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"45292","DOI":"10.1109\/ACCESS.2020.2975615","volume":"8","author":"J Zhao","year":"2020","unstructured":"Zhao, J., et al.: A Secure biometrics and PUFs-based authentication scheme with key agreement for multi-server environments. IEEE Access 8, 45292\u201345303 (2020)","journal-title":"IEEE Access"},{"key":"7_CR5","first-page":"102704","volume":"58","author":"W Yang","year":"2021","unstructured":"Yang, W., Wang, S., Shahzad, M., Zhou, W.: A cancelable biometric authentication system based on feature-adaptive random projection. J. Inf. Secur. Appl. 58, 102704 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Arjona, R., Baturone, I.: A dual-factor access control system based on device and user intrinsic identifiers. In: IECON 2016\u201342nd Annual Conference of the IEEE Industrial Electronics Society, pp. 4731\u20134736. IEEE (2016)","DOI":"10.1109\/IECON.2016.7793033"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Arjona, R., Prada-Delgado, M.A., Baturone, I., Ross, A.: Securing minutia cylinder codes for fingerprints through physically unclonable functions: an exploratory study. In: 2018 International Conference on Biometrics (ICB), pp. 54\u201360. IEEE (2018)","DOI":"10.1109\/ICB2018.2018.00019"},{"issue":"7","key":"7_CR8","doi-asserted-by":"publisher","first-page":"2257","DOI":"10.1007\/s00500-017-2487-9","volume":"22","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Ling, J., Liu, Z., Shen, J., Gao, C.: Finger vein secure biometric template generation based on deep learning. Soft. Comput. 22(7), 2257\u20132265 (2017). https:\/\/doi.org\/10.1007\/s00500-017-2487-9","journal-title":"Soft. Comput."},{"issue":"7","key":"7_CR9","doi-asserted-by":"publisher","first-page":"4244","DOI":"10.1109\/TII.2019.2900665","volume":"15","author":"W Yang","year":"2019","unstructured":"Yang, W., Wang, S., Hu, J., Zheng, G., Yang, J., Valli, C.: Securing deep learning based edge finger vein biometrics with binary decision diagram. IEEE Trans. Industr. Inf. 15(7), 4244\u20134253 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"3","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 1\u201327 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Rakshit, P., Basu, R., Paul, S., Bhattacharyya, S., Mistri, J., Nath, I.: Face Detection using Support Vector Mechine with PCA. Available at SSRN 3515989 (2020)","DOI":"10.2139\/ssrn.3515989"},{"key":"7_CR12","first-page":"810","volume":"1","author":"M Saraswathi","year":"2015","unstructured":"Saraswathi, M., Sivakumari, D.S.: Evaluation of PCA and LDA techniques for Face recognition using ORL face database. Int. J. Comput. Sci. Inf. Technol. 1, 810\u2013813 (2015)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"issue":"2","key":"7_CR13","first-page":"23","volume":"23","author":"SS Danraka","year":"2019","unstructured":"Danraka, S.S., Yahaya, S.M., Usman, A.D., Umar, A., Abubakar, A.M.: Discrete firefly algorithm based feature selection scheme for improved face recognition. Comput. Inf. Syst. 23(2), 23\u201334 (2019)","journal-title":"Comput. Inf. Syst."},{"issue":"6","key":"7_CR14","doi-asserted-by":"publisher","first-page":"1406","DOI":"10.1109\/TIFS.2017.2788000","volume":"13","author":"M Gomez-Barrero","year":"2017","unstructured":"Gomez-Barrero, M., Galbally, J., Rathgeb, C., Busch, C.: General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans. Inf. Forensics Secur. 13(6), 1406\u20131420 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-94029-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T12:32:52Z","timestamp":1651235572000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-94029-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030940287","9783030940294"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-94029-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"11 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/css2021.compute.dtu.dk\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}