{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:24:58Z","timestamp":1725567898477},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221463"},{"type":"electronic","value":"9783540259480"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25948-0_54","type":"book-chapter","created":{"date-parts":[[2010,10,24]],"date-time":"2010-10-24T13:03:58Z","timestamp":1287925438000},"page":"387-394","source":"Crossref","is-referenced-by-count":12,"title":["Private Fingerprint Verification without Local Storage"],"prefix":"10.1007","author":[{"given":"Florian","family":"Kerschbaum","sequence":"first","affiliation":[]},{"given":"Mikhail J.","family":"Atallah","sequence":"additional","affiliation":[]},{"given":"David","family":"M\u2019Ra\u00efhi","sequence":"additional","affiliation":[]},{"given":"John R.","family":"Rice","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","volume-title":"ICSA Guide to Cryptography","author":"C. Soutar","year":"1999","unstructured":"Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.K.V.: Biometric Encryption. In: Nichols, R.K. (ed.) ICSA Guide to Cryptography, McGraw-Hill Publishers, New York (1999)"},{"key":"54_CR2","unstructured":"Cambier, J.L., von Seelen, U.C., Braithwaite, M., Moore, R., Glass, R., Scott, I.: Application-Dependent Biometric Templates BC14. In: The Biometric Consortium Conference (2002)"},{"key":"54_CR3","doi-asserted-by":"crossref","unstructured":"Cappelli, R., Erol, A., Maio, D., Maltoni, D.: Synthetic Fingerprint-image Generation. In: ICPR 2000, Proceedings International Conference on Pattern Recognition (2000)","DOI":"10.1109\/ICPR.2000.903586"},{"key":"54_CR4","unstructured":"Davida, G.I., Matt, B.J., Peralta, R., Frankel, Y.: On the relation of error correction and cryptography to an off line biometric based identification scheme. In: WCC 1999, Workshop on Coding and Cryptography (1999)"},{"key":"54_CR5","doi-asserted-by":"crossref","unstructured":"Du, W., Atallah, M.J.: Protocols for Secure Remote Database Access with Approximate Matching. In: ACMCCS 2000, 7th ACM Conference on Computer and Communications Security, The First Workshop on Security and Privacy in ECommerce (2000)","DOI":"10.1007\/978-1-4615-1467-1_6"},{"key":"54_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1007\/3-540-48224-5_75","volume-title":"Automata, Languages and Programming","author":"J. Feigenbaum","year":"2001","unstructured":"Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M.J., Wright, R.N.: Secure Multiparty Computation of Approximations. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol.\u00a02076, pp. 927\u2013938. Springer, Heidelberg (2001) (Extended Abstract)"},{"key":"54_CR7","unstructured":"Goldreich, O.: Secure Multi-Party Computation (2002) (manuscript), http:\/\/www.wisdom.weizmann.ac.il\/oded\/pp.html"},{"key":"54_CR8","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer and System Sciences\u00a028(2) (1984)","DOI":"10.1016\/0022-0000(84)90070-9"},{"issue":"4","key":"54_CR9","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/34.587996","volume":"19","author":"A.K. Jain","year":"1997","unstructured":"Jain, A.K., Hong, L., Bolle, R.: On-line Fingerprint Verification. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a019(4), 302\u2013314 (1997)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"54_CR10","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: CCS1999, Proc. of the 6th ACM Conference on Computer and Communications Security (1999)","DOI":"10.1145\/319709.319714"},{"key":"54_CR11","doi-asserted-by":"crossref","unstructured":"Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of Artificial \u201dGummy\u201d Fingers on Fingerprint Systems. In: SPIE. Optical Security and Counterfeit Deterrence Techniques IV, vol.\u00a04677 (2002)","DOI":"10.1117\/12.462719"},{"issue":"3","key":"54_CR12","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/34.990140","volume":"24","author":"D. Maio","year":"2002","unstructured":"Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2000: Fingerprint Verification Competition. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a024(3), 402\u2013412 (2002)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"54_CR13","unstructured":"Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2002: Second Fingerprint Verification Competition. In: ICPR 2002, Proc. of International Conference on Pattern Recognition (2002)"},{"key":"54_CR14","volume-title":"Handbook of Fingerprint Recognition","author":"D. Maltoni","year":"2003","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition, June 2003. Springer, Heidelberg (2003)"},{"issue":"8","key":"54_CR15","doi-asserted-by":"publisher","first-page":"1847","DOI":"10.1016\/S0031-3203(02)00322-9","volume":"36","author":"S. Prabhakar","year":"2003","unstructured":"Prabhakar, S., Jain, A.K., Pankanti, S.: Learning Fingerprint Minutiae Location and Type. Pattern Recognition\u00a036(8), 1847\u20131857 (2003)","journal-title":"Pattern Recognition"},{"issue":"3","key":"54_CR16","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"N. Ratha","year":"2001","unstructured":"Ratha, N., Connell, J., Bolle, R.: Enhancing security and privacy in biometricsbased authentication systems. IBM Systems Journal\u00a040(3), 614\u2013634 (2001)","journal-title":"IBM Systems Journal"},{"key":"54_CR17","doi-asserted-by":"crossref","unstructured":"Ross, A., Jain, A.K., Reisman, J.: A Hybrid Fingerprint Matcher. In: Proc. of International Conference on Pattern Recognition (ICPR), vol.\u00a03, pp. 795\u2013798 (2002)","DOI":"10.1109\/ICPR.2002.1048138"},{"key":"54_CR18","doi-asserted-by":"crossref","unstructured":"Yao, A.: Protocols for Secure Computations. In: FOCS 1982, Proc. of the Twenty-third IEEE Symposium on Foundations of Computer Science, pp. 160\u2013164 (1982)","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Lecture Notes in Computer Science","Biometric Authentication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25948-0_54.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T11:02:17Z","timestamp":1636714937000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25948-0_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221463","9783540259480"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25948-0_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}