{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:48:41Z","timestamp":1742939321314,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243146"},{"type":"electronic","value":"9783319243153"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24315-3_26","type":"book-chapter","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T16:20:13Z","timestamp":1444062013000},"page":"255-264","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse"],"prefix":"10.1007","author":[{"given":"Chunlu","family":"Chen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hiroaki","family":"Anada","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Junpei","family":"Kawamoto","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Suh, G.E, Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th Annual Design Automation Conference. ACM (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"26_CR2","unstructured":"Kumar, S.S., et al.: The butterfly PUF protecting IP on every FPGA. In: IEEE International Workshop on Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE (2008)"},{"issue":"2","key":"26_CR3","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/328236.328110","volume":"43","author":"A Jain","year":"2000","unstructured":"Jain, A., Hong, L., Pankanti, S.: Biometric identification. Commun. ACM 43(2), 90\u201398 (2000)","journal-title":"Commun. ACM"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1155\/2008\/579416","volume":"2008","author":"AK Jain","year":"2008","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 2008, 113 (2008)","journal-title":"EURASIP J. Adv. Signal Process."},{"issue":"6","key":"26_CR5","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U Uludag","year":"2004","unstructured":"Uludag, U., et al.: Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948\u2013960 (2004)","journal-title":"Proc. IEEE"},{"key":"26_CR6","unstructured":"Nick Doty, W.C.: Fingerprinting Guidance for Web Specification Authors (Unofficial Draft) February 24 2015. available: \n                      http:\/\/w3c.github.io\/fingerprinting-guidance\/"},{"key":"26_CR7","unstructured":"Aggarwal, G., et al.: An Analysis of Private Browsing Modes in Modern Browsers. In: SENIX Security Symposium (2010)"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14527-8_1","volume-title":"Privacy Enhancing Technologies","author":"P Eckersley","year":"2010","unstructured":"Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1\u201318. Springer, Heidelberg (2010)"},{"key":"26_CR9","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, 2007. SP 2007, pp. 321\u2013334 (2007)"},{"key":"26_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011)"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 456\u2013465 (2007)","DOI":"10.1145\/1315245.1315302"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-540-24676-3_13","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"R Canetti","year":"2004","unstructured":"Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207\u2013222. Springer, Heidelberg (2004)"},{"key":"26_CR13","unstructured":"Naruse, T., Mohri, M., Shiraishi, Y.: Attribute revocable attribute-based encryption with forward secrecy. In: Proceedings of the 2014 Information Processing Society of Japan. Japan (2014)"},{"key":"26_CR14","unstructured":"Li, J., Ren, K., Kim, K.: A2BE: accountable attribute-based encryption for abuse free access control. IACR Cryptology ePrint Archive, vol. 2009, p. 118 (2009)"},{"key":"26_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-642-04474-8_28","volume-title":"Information Security","author":"J Li","year":"2009","unstructured":"Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-aware attribute-based encryption with user accountability. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 347\u2013362. Springer, Heidelberg (2009)"},{"key":"26_CR16","unstructured":"Hinek, M.J., et al.: Attribute-based encryption with key cloning protection. IACR Cryptology ePrint Archive 2008, p. 478 (2008)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24315-3_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T03:49:50Z","timestamp":1569383390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24315-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243146","9783319243153"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24315-3_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}