{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:04:43Z","timestamp":1725516283692},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689782"},{"type":"electronic","value":"9783540689799"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68979-9_12","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T08:02:26Z","timestamp":1218528146000},"page":"155-165","source":"Crossref","is-referenced-by-count":1,"title":["Combining Biometric Authentication with Privacy-Enhancing Technologies"],"prefix":"10.1007","author":[{"given":"Konstantin","family":"Hypp\u00f6nen","sequence":"first","affiliation":[]},{"given":"Marko","family":"Hassinen","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Trichina","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management \u2013 a consolidated proposal for terminology. version v0.29 (2007)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11766155_1","volume-title":"Emerging Trends in Information and Communication Security","author":"A. Pfitzmann","year":"2006","unstructured":"Pfitzmann, A.: Multilateral security: Enabling technologies and their evaluation. In: M\u00fcller, G. (ed.) ETRICS 2006. LNCS, vol.\u00a03995, pp. 1\u201313. Springer, Heidelberg (2006)"},{"key":"12_CR3","unstructured":"CEN\/ISSS Workshop eAuthentication: Towards an electronic ID for the European Citizen, a strategic vision. Brussels (2004) (accessed 10.10.2007), http:\/\/europa.eu.int\/idabc\/servlets\/Doc?id=19132"},{"key":"12_CR4","first-page":"0012","volume":"013","author":"The European Parliament and the Council of the European Union","year":"2000","unstructured":"The European Parliament and the Council of the European Union: Directive 1999\/93\/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. Official Journal L\u00a0013, 0012\u20130020 (2000)","journal-title":"Official Journal L"},{"key":"12_CR5","unstructured":"Witteman, M.: Attacks on digital passports. Talk at the What The Hack conference (2005) (Accessed 10.10.2007), http:\/\/wiki.whatthehack.org\/images\/2\/28\/WTH-slides-Attacks-on-Digital-Passports-Marc-Witteman.pdf"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Juels, A., Molnar, D., Wagner, D.: Security and privacy issues in e-passports. In: Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference, pp. 74\u201388 (2005)","DOI":"10.1109\/SECURECOMM.2005.59"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11908739_11","volume-title":"Advances in Information and Computer Security","author":"J.H. Hoepman","year":"2006","unstructured":"Hoepman, J.H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.: Crossing borders: Security and privacy issues of the european e-passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S. (eds.) IWSEC 2006. LNCS, vol.\u00a04266, pp. 152\u2013167. Springer, Heidelberg (2006)"},{"key":"12_CR8","unstructured":"FIDIS - Future of Identity in the Information Society: Budapest declaration on machine readable travel documents (MRTDs) (2006) (Accessed 10.10.2007), http:\/\/www.fidis.net\/fileadmin\/fidis\/press\/budapest_declaration_on_MRTD.en.20061106.pdf"},{"key":"12_CR9","unstructured":"The Royal Academy of Engineering: Dilemmas of privacy and surveillance: Challenges of technological change. The Royal Academy of Engineering, 29 Great Peter Street, London, SW1P 3LW (2007)"},{"key":"12_CR10","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","volume-title":"Rethinking Public Key Infrastructures and Digital Certificates : Building in Privacy","author":"S.A. Brands","year":"2000","unstructured":"Brands, S.A.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. The MIT Press, Cambridge (2000)"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/11935308_10","volume-title":"Information and Communications Security","author":"J. Li","year":"2006","unstructured":"Li, J., Li, N.: A construction for general and efficient oblivious commitment based envelope protocols. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 122\u2013138. Springer, Heidelberg (2006)"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/586110.586114","volume-title":"CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security","author":"J. Camenisch","year":"2002","unstructured":"Camenisch, J., Herreweghen, E.V.: Design and implementation of the idemix anonymous credential system. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 21\u201330. ACM, New York (2002)"},{"key":"12_CR13","unstructured":"Java Community Process: Contactless Communication API, JSR 257, v. 1.0. Nokia Corporation, Espoo, Finland (2006) (Accessed 10.10.2007), http:\/\/www.jcp.org\/en\/jsr\/detail?id=257"},{"key":"12_CR14","unstructured":"Java Community Process: Security and Trust Services API (SATSA) for JavaTM2 Platform, Micro Edition, v. 1.0. Sun Microsystems, Inc., Santa Clara, CA, USA (2004) (accessed 10.10.2007), http:\/\/www.jcp.org\/en\/jsr\/detail?id=177"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Santesson, S., Polk, W., Barzin, P., Nystrom, M.: Internet X.509 public key infrastructure qualified certificates profile. Network Working Group, Request for Comments 3039 (2001) (accessed 10.10.2007)","DOI":"10.17487\/rfc3039"},{"key":"12_CR16","series-title":"IFIP Conference Proceedings","first-page":"257","volume-title":"CARDIS","author":"F. Boudot","year":"2000","unstructured":"Boudot, F.: Partial revelation of certified identity. In: Domingo-Ferrer, J., Chan, D., Watson, A. (eds.) CARDIS. IFIP Conference Proceedings, vol.\u00a0180, pp. 257\u2013272. Kluwer, Dordrecht (2000)"},{"key":"12_CR17","unstructured":"Trusted Computing Group: TCG mobile trusted module specification, version 1.0, revision 1. TCG published (2007)"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 294\u2013311. Springer, Heidelberg (2003)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Petitcolas, F.A.P., Steinebach, M., Raynal, F., Dittmann, J., Fontaine, C., Fates, N.: Public automated web-based evaluation service for watermarking schemes: StirMark benchmark. In: Wong, P.W., Delp III, E.J. (eds.) Security and watermarking of multimedia contents III: SPIE proc. ser., vol.\u00a04314, pp. 575\u2013584. SPIE (2001)","DOI":"10.1117\/12.435442"}],"container-title":["Lecture Notes in Computer Science","Trusted Computing - Challenges and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68979-9_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:30:48Z","timestamp":1605745848000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68979-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540689782","9783540689799"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68979-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}