{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T16:49:07Z","timestamp":1761929347804},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540738138"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73814-5_4","type":"book-chapter","created":{"date-parts":[[2007,9,1]],"date-time":"2007-09-01T05:31:44Z","timestamp":1188624704000},"page":"38-49","source":"Crossref","is-referenced-by-count":10,"title":["Biometric Digital Signature Key Generation and Cryptography Communication Based on Fingerprint"],"prefix":"10.1007","author":[{"given":"Je-Gyeong","family":"Jo","sequence":"first","affiliation":[]},{"given":"Jong-Won","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Hyung-Woo","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021, 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"issue":"2","key":"4_CR2","first-page":"203","volume":"46","author":"D. Boneh","year":"1999","unstructured":"Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS)\u00a046(2), 203\u2013213 (1999)","journal-title":"Notices of the American Mathematical Society (AMS)"},{"issue":"4","key":"4_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-30","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory\u00a0IT-30(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR4","unstructured":"Juels, A., Sudan, M.: A Fuzzy Vault Scheme, also available at \n                  \n                    http:\/\/www.rsasecurity.com\/rsalabs\/staff\/bios\/ajuels\/publications\/fuzzy-vault\/fuzzy_vault.pdf"},{"key":"4_CR5","first-page":"312","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, pp.287-291, pp.312-315. CRC Press, Boca Raton, USA (1997)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/978-3-540-25976-3_15","volume-title":"Biometric Authentication","author":"P. Tuyls","year":"2004","unstructured":"Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol.\u00a03087, pp. 158\u2013170. Springer, Heidelberg (2004)"},{"key":"4_CR7","unstructured":"Nagpal, R., Nagpal, S.: Biometric based digital signature scheme. Internet-Draft, draft-nagpal-biometric-digital-signature-00.txt (May 2002)"},{"key":"4_CR8","volume-title":"Proceedings of the Security and Privacy","author":"Y. Dodis","year":"1998","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to generate strong keys from biometric identification. In: Proceedings of the Security and Privacy, IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/11426639_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X. Boyen","year":"2005","unstructured":"Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometrics. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 147\u2013163. Springer, Heidelberg (2005)"},{"key":"4_CR10","unstructured":"Soutar, C.: Biometric system performance and security (2002), Manuscript available at \n                  \n                    http:\/\/www.bioscrypt.com\/assets\/biopaper.pdf"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM (February 2000)","DOI":"10.1145\/328236.328110"},{"issue":"5","key":"4_CR12","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1108\/09685220110408022","volume":"9","author":"P. Janbandhu","year":"2001","unstructured":"Janbandhu, P., Siyal, M.: Novel biometric digital signatures for Internet-based applications. Information Man-agement & Computer Security\u00a09(5), 205\u2013212 (2001)","journal-title":"Information Man-agement & Computer Security"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"T. Kwon","year":"2004","unstructured":"Kwon, T., Lee, J.: Practical digital signature generation using biometrics. In: Lagan\u00e0, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03043, Springer, Heidelberg (2004)"},{"key":"4_CR14","first-page":"26","volume-title":"Networkshop","author":"P. Orvos","year":"2002","unstructured":"Orvos, P.: Towards biometric digital signatures. Networkshop, pp. 26\u201328. Eszterhazy College, Eger (March 2002)"}],"container-title":["Lecture Notes in Computer Science","Frontiers in Algorithmics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73814-5_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:00:28Z","timestamp":1619517628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73814-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540738138"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73814-5_4","relation":{},"subject":[]}}