{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:02:43Z","timestamp":1743055363414,"version":"3.40.3"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319213552"},{"type":"electronic","value":"9783319213569"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21356-9_1","type":"book-chapter","created":{"date-parts":[[2015,7,15]],"date-time":"2015-07-15T01:20:09Z","timestamp":1436923209000},"page":"3-12","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Authentication in Constrained Settings"],"prefix":"10.1007","author":[{"given":"Aikaterini","family":"Mitrokotsa","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,16]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/978-3-319-12280-9_19","volume-title":"Cryptology and Network Security","author":"A Abidin","year":"2014","unstructured":"Abidin, A., Matsuura, K., Mitrokotsa, A.: Security of a privacy-preserving biometric authentication protocol revisited. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) CANS 2014. LNCS, vol. 8813, pp. 290\u2013304. Springer, Heidelberg (2014)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Abidin, A., Mitrokotsa, A.: Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-lwe. In: Proceedings of the IEEE Workshop on Information Forensics and Security 2014 (WIFS 2014). Atlanta, USA. December 2014","DOI":"10.1109\/WIFS.2014.7084304"},{"key":"1_CR3","unstructured":"Abidin, A., Pagnin, E., Mitrokotsa, A.: Attacks on privacy-preserving biometric authentication. In: Proceedings of the 19th Nordic Conference on Secure IT Systems (NordSec 2014), pp. 293\u2013294. Tromso, Norway. October 2014"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: Proceedings of ACM SIGMOD 2003, pp. 86\u201397. ACM, NY (2003)","DOI":"10.1145\/872757.872771"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of ACM SIGMOD 2000, pp. 439\u2013450. ACM, NY (2000)","DOI":"10.1145\/342009.335438"},{"key":"1_CR6","unstructured":"Ahmadi, H., Safavi-Naini, R.: Secure distance bounding verification using physical-channel properties (2013). arXiv:1303.0346"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Ahn, L.V., Blum, M., Hopper, N.J., Langford, J.: Captcha: using hard ai problems for security. In: Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT 2003, pp. 294\u2013311. Springer, Heidelberg (2003)","DOI":"10.1007\/3-540-39200-9_18"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-642-25243-3_7","volume-title":"Information and Communications Security","author":"J-P Aumasson","year":"2011","unstructured":"Aumasson, J.-P., Mitrokotsa, A., Peris-Lopez, P.: A note on a privacy-preserving distance-bounding protocol. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 78\u201392. Springer, Heidelberg (2011)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-540-70500-0_3","volume-title":"Information Security and Privacy","author":"M Barbosa","year":"2008","unstructured":"Barbosa, M., Brouard, T., Cauchie, S., de Sousa, S.M.: Secure biometric authentication with improved accuracy. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 21\u201336. Springer, Heidelberg (2008)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Barni, M.: A game theoretic approach to source identification with known statistics. In: Proceedings of ICASSP 2012. pp. 1745\u20131748. Kyoto, Japan. March 2012","DOI":"10.1109\/ICASSP.2012.6288236"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-642-38519-3_23","volume-title":"Information Security and Cryptology","author":"A Bay","year":"2013","unstructured":"Bay, A., Boureanu, I., Mitrokotsa, A., Spulber, I., Vaudenay, S.: The bussard-bagga and other distance-bounding protocols under attacks. In: Kuty\u0142owski, M., Yung, M. (eds.) Inscrypt 2012. LNCS, vol. 7763, pp. 371\u2013391. Springer, Heidelberg (2013)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Blum, A., Ligett, K., Roth, A.: A learning theory approach to non-interactive database privacy. In: STOC 2008, pp. 609\u2013618 (2008)","DOI":"10.1145\/1374376.1374464"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-642-33481-8_6","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2012","author":"I Boureanu","year":"2012","unstructured":"Boureanu, I., Mitrokotsa, A., Vaudenay, S.: On the pseudorandom function assumption in (secure) distance-bounding protocols. In: Hevia, A., Neven, G. (eds.) LatinCrypt 2012. LNCS, vol. 7533, pp. 100\u2013120. Springer, Heidelberg (2012)"},{"key":"1_CR14","unstructured":"Boureanu, I., Mitrokotsa, A., Vaudenay, S.: Practical and provably secure distance-bounding. In: Proceedings of the 16th Information Security Conference (ISC). Dallas, Texas, USA. November 2013"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Boureanu, I., Mitrokotsa, A., Vaudenay, S.: Secure and lightweight distance-bounding. In: Proceedings of LightSec 2013. Gebze, Turkey. May 6\u20137 2013","DOI":"10.1007\/978-3-642-40392-7_8"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Boureanu, I., Mitrokotsa, A., Vaudenay, S.: Practical and provably secure distance-bounding. Journal of Computer Security (2014)","DOI":"10.1007\/978-3-319-27659-5_18"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-48285-7_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"S Brands","year":"1994","unstructured":"Brands, S., Chaum, D.: Distance bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344\u2013359. Springer, Heidelberg (1994)"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-540-73458-1_8","volume-title":"Information Security and Privacy","author":"J Bringer","year":"2007","unstructured":"Bringer, J., Chabanne, H., Izabach\u00e8ne, M., Pointcheval, D., Tang, Q., Zimmer, S.: An application of the goldwasser-micali cryptosystem to biometric authentication. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 96\u2013106. Springer, Heidelberg (2007)"},{"key":"1_CR19","unstructured":"Bussard, L.: Trust Establishment Protocols for Communicating Devices. Ph.D. thesis, Ecole Nationale Sup\u00e9rieure des T\u00e9l\u00e9communications, Institut Eur\u00e9com, T\u00e9l\u00e9com Paris (2004)"},{"key":"1_CR20","first-page":"1069","volume":"12","author":"K Chaudhuri","year":"2011","unstructured":"Chaudhuri, K., Monteleoni, C., Sarwate, A.D.: Differentially private empirical risk minimization. JMLR 12, 1069\u20131109 (2011)","journal-title":"JMLR"},{"issue":"6","key":"1_CR21","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965\u2013981 (1998)","journal-title":"J. ACM"},{"issue":"7","key":"1_CR22","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.cose.2005.08.003","volume":"24","author":"N Clarke","year":"2005","unstructured":"Clarke, N., Furnell, S.: Authentication of users on mobile telephones - a survey of attitudes and practices. Comput. Secur. 24(7), 519\u2013527 (2005)","journal-title":"Comput. Secur."},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Dimitrakakis, C., Mitrokotsa, A., Vaudenay, S.: Expected loss bounds for authentication in constrained channels. In: Proceedings of INFOCOM 2012, pp. 478\u201385. Orlando, FL, USA. March 2012","DOI":"10.1109\/INFCOM.2012.6195788"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Dimitrakakis, C., Mitrokotsa, A., Vaudenay, S.: Expected loss analysis for authentication in constrained channels. Journal of Computer Security (2014)","DOI":"10.3233\/JCS-140521"},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/978-3-319-11662-4_21","volume-title":"Algorithmic Learning Theory","author":"C Dimitrakakis","year":"2014","unstructured":"Dimitrakakis, C., Nelson, B., Mitrokotsa, A., Rubinstein, B.I.P.: Robust and private bayesian inference. In: Auer, P., Clark, A., Zeugmann, T., Zilles, S. (eds.) ALT 2014. LNCS, vol. 8776, pp. 291\u2013305. Springer, Heidelberg (2014)"},{"issue":"1","key":"1_CR26","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"key":"1_CR27","unstructured":"Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding against smartcard relay attacks. In: Proceedings of USENIX 2007, pp. 7:1\u20137:16. Berkeley, CA, USA (2007)"},{"key":"1_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"1_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-642-38980-1_26","volume-title":"Applied Cryptography and Network Security","author":"M Fischlin","year":"2013","unstructured":"Fischlin, M., Onete, C.: Terrorism in distance bounding: modeling terrorist-fraud resistance. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 414\u2013431. Springer, Heidelberg (2013)"},{"key":"1_CR30","unstructured":"Francillon, A., Danev, B., \u010capkun, S.: Relay attacks on passive keyless entry and start systems in modern cars. In: Proceedings of NDSS 2011. San Diego, CL, USA (2011)"},{"key":"1_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63\u201380. Springer, Heidelberg (2007)"},{"issue":"7","key":"1_CR32","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1016\/j.cose.2009.06.001","volume":"28","author":"GP Hancke","year":"2009","unstructured":"Hancke, G.P., Mayes, K.E., Markantonakis, K.: Confidence in smart token proximity: relay attacks revisited. Comput. Secur. 28(7), 404\u2013408 (2009)","journal-title":"Comput. Secur."},{"issue":"2","key":"1_CR33","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. J. Des. Codes Crypt. 38(2), 237\u2013257 (2006)","journal-title":"J. Des. Codes Crypt."},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of CCS 1999, pp. 28\u201336. NY, USA (1999)","DOI":"10.1145\/319709.319714"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Kasiviswanathan, S.P., Lee, H.K., Nissim, K., Raskhodnikova, S., Smith, A.: What can we learn privately? In: Proceedings of FOCS 2008, pp. 531\u2013540 (2008)","DOI":"10.1109\/FOCS.2008.27"},{"key":"1_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-00730-9_7","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"CH Kim","year":"2009","unstructured":"Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The swiss-knife rfid distance bounding protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98\u2013115. Springer, Heidelberg (2009)"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.J., Tuyls, P.: Extended abstract: the butterfly PUF protecting IP on every FPGA. In: Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, HST 2008, pp. 67\u201370. IEEE Computer Society, Washington, DC (2008)","DOI":"10.1109\/HST.2008.4559053"},{"issue":"8","key":"1_CR38","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1016\/j.adhoc.2009.04.009","volume":"7","author":"N Li","year":"2009","unstructured":"Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Netw. 7(8), 1501\u20131514 (2009)","journal-title":"Ad Hoc Netw."},{"volume-title":"Encyclopedia of Biometrics","year":"2009","key":"1_CR39","unstructured":"Li, S.Z., Jain, A.K. (eds.): Encyclopedia of Biometrics. Springer, New York (2009)"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proceedings of AVBPA 2003, pp. 393\u2013402. Springer-Verlag, Heidelberg (2003)","DOI":"10.1007\/3-540-44887-X_47"},{"issue":"2","key":"1_CR41","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/LCOMM.2010.02.091946","volume":"14","author":"A Mitrokotsa","year":"2010","unstructured":"Mitrokotsa, A., Dimitrakakis, C., Peris-Lopez, P., Castro, J.C.H.: Reid et al\u2019.s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Commun. Lett. 14(2), 121\u2013123 (2010)","journal-title":"IEEE Commun. Lett."},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Mitrokotsa, A., Onete, C., Vaudenay, S.: Mafia Fraud Attack against the R\u010c Distance-Bounding Protocol. In: Proceedings of IEEE RFID-TA 2012, pp. 74\u201379. Nice, France. November 2012","DOI":"10.1109\/RFID-TA.2012.6404571"},{"key":"1_CR43","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.cose.2014.06.001","volume":"45","author":"A Mitrokotsa","year":"2014","unstructured":"Mitrokotsa, A., Onete, C., Vaudenay, S.: Location leakage in distance bounding: why location privacy does not work. Comput. Secur. 45, 199\u2013209 (2014)","journal-title":"Comput. Secur."},{"issue":"10","key":"1_CR44","doi-asserted-by":"publisher","first-page":"1216","DOI":"10.1093\/comjnl\/bxt033","volume":"56","author":"A Mitrokotsa","year":"2013","unstructured":"Mitrokotsa, A., Peris-Lopez, P., Dimitrakakis, C., Vaudenay, S.: On selecting the nonce length in distance-bounding protocols. Comput. J. 56(10), 1216\u20131227 (2013)","journal-title":"Comput. J."},{"key":"1_CR45","doi-asserted-by":"publisher","first-page":"884","DOI":"10.1016\/j.comcom.2010.01.002","volume":"33","author":"J Munilla","year":"2010","unstructured":"Munilla, J., Peinado, A.: Attacks on a distance bounding protocol. Comput. Commun. 33, 884\u2013889 (2010)","journal-title":"Comput. Commun."},{"key":"1_CR46","doi-asserted-by":"crossref","unstructured":"Pagnin, E., Dimitrakakis, C., Abidin, A., Mitrokotsa, A.: On the leakage of information in biometric authentication. In: Proceedings of the 15th International Conference on Cryptology in India INDOCRYPT 2014. pp. 265\u2013280. New Delhi, India. December 2014","DOI":"10.1007\/978-3-319-13039-2_16"},{"key":"1_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"1_CR48","first-page":"187","volume":"2005","author":"MO Rabin","year":"2005","unstructured":"Rabin, M.O.: How to exchange secrets with oblivious transfer. IACR Cryptology ePrint Arch. 2005, 187 (2005)","journal-title":"IACR Cryptology ePrint Arch."},{"key":"1_CR49","doi-asserted-by":"crossref","unstructured":"Rasmussen, K., \u010capkun, S.: Location privacy of distance bounding. In: Proceedings of CCS 2008, pp. 149\u2013160. ACM (2008)","DOI":"10.1145\/1455770.1455791"},{"issue":"4","key":"1_CR50","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"NK Ratha","year":"2007","unstructured":"Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561\u2013572 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1_CR51","first-page":"281","volume-title":"Towards Hardware-Intrinsic Security, Information Security and Cryptography - THIS 2010","author":"AR Sadeghi","year":"2010","unstructured":"Sadeghi, A.R., Visconti, I., Wachsmann, C.: Enhancing RFID security and privacy by physically unclonable functions. In: Sadeghi, A.R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security, Information Security and Cryptography - THIS 2010, pp. 281\u2013305. Springer, Heidelberg. (2010)"},{"issue":"2","key":"1_CR52","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1109\/TIFS.2012.2184092","volume":"7","author":"K Simoens","year":"2012","unstructured":"Simoens, K., Bringer, J., Chabanne, H., Seys, S.: A framework for analyzing template security and privacy in biometric authentication systems. IEEE Trans. Inf. Forensics Secur. 7(2), 833\u2013841 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1_CR53","doi-asserted-by":"crossref","unstructured":"Simoens, K., Tuyls, P., Preneel, B.: Privacy weaknesses in biometric sketches. In: IEEE Symposium on Security and Privacy, pp. 188\u2013203. May 2009","DOI":"10.1109\/SP.2009.24"},{"key":"1_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-540-73275-4_8","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"D Singel\u00e9e","year":"2007","unstructured":"Singel\u00e9e, D., Preneel, B.: Distance bounding in noisy environments. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 101\u2013115. Springer, Heidelberg (2007)"},{"key":"1_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-38004-4_14","volume-title":"Security and Trust Management","author":"S Mauw","year":"2013","unstructured":"Mauw, S., Piramuthu, S.: A PUF-based authentication protocol to address ticket-switching of rfid-tagged items. In: J\u00f8sang, A., Samarati, P., Petrocchi, M. (eds.) STM 2012. LNCS, vol. 7783, pp. 209\u2013224. Springer, Heidelberg (2013)"},{"key":"1_CR56","doi-asserted-by":"crossref","unstructured":"Stoianov, A.: Cryptographically secure biometrics. In: Proceedings of SPIE 7667, Biometric Technology for Human Identification VII, vol. 76670C, pp. 76670C\u201376670C-12. April 2010","DOI":"10.1117\/12.849028"},{"key":"1_CR57","doi-asserted-by":"crossref","unstructured":"Sukarno, P., Phu, M., Bhattacharjee, N., Srinivasan, B.: Increasing error tolerance in biometric systems. In: Proceedings of MoMM 2010, pp. 50\u201355. ACM, New York (2010)","DOI":"10.1145\/1971519.1971531"},{"key":"1_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-642-16280-0_10","volume-title":"Provable Security","author":"T Baign\u00e8res","year":"2010","unstructured":"Baign\u00e8res, T., Sepehrdad, P., Vaudenay, S.: Distinguishing distributions using chernoff information. In: Heng, S.-H., Kurosawa, K. (eds.) ProvSec 2010. LNCS, vol. 6402, pp. 144\u2013165. Springer, Heidelberg (2010)"},{"issue":"1","key":"1_CR59","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MPRV.2012.54","volume":"12","author":"P Tresadern","year":"2013","unstructured":"Tresadern, P., Cootes, T.F., Poh, N., Matejka, P., Hadid, A., Levy, C., McCool, C., Marcel, S.: Mobile biometrics: combined face and voice verification for a mobile platform. IEEE Pervasive Comput. 12(1), 79\u201387 (2013)","journal-title":"IEEE Pervasive Comput."},{"key":"1_CR60","unstructured":"Tu, Y.J., Piramuthu, S.: RFID Distance Bounding Protocols. In: Proceedings of EURASIP Workshop on RFID Technology, pp. 67\u201368. Vienna, Austria. September 2007"},{"key":"1_CR61","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/11605805_8","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"P Tuyls","year":"2006","unstructured":"Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115\u2013131. Springer, Heidelberg (2006)"},{"volume-title":"Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting","year":"2007","key":"1_CR62","unstructured":"Tuyls, P., Skoric, B., Kevenaar, T. (eds.): Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer, Heidelberg (2007)"},{"key":"1_CR63","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/978-3-540-74549-5_42","volume-title":"Advances in Biometrics","author":"M Une","year":"2007","unstructured":"Une, M., Otsuka, A., Imai, H.: Wolf attack probability: a new security measure in biometric authentication systems. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 396\u2013406. Springer, Heidelberg (2007)"},{"key":"1_CR64","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68\u201387. Springer, Heidelberg (2007)"},{"key":"1_CR65","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-41227-1_1","volume-title":"Provable Security","author":"S Vaudenay","year":"2013","unstructured":"Vaudenay, S.: On modeling terrorist frauds. In: Susilo, W., Reyhanitabar, R. (eds.) ProvSec 2013. LNCS, vol. 8209, pp. 1\u201320. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Information Security in the Balkans"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21356-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T09:45:00Z","timestamp":1676972700000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21356-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319213552","9783319213569"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21356-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"16 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}