{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:54:27Z","timestamp":1725490467483},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540745488"},{"type":"electronic","value":"9783540745495"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74549-5_94","type":"book-chapter","created":{"date-parts":[[2007,8,29]],"date-time":"2007-08-29T06:01:49Z","timestamp":1188367309000},"page":"897-906","source":"Crossref","is-referenced-by-count":4,"title":["Feeling Is Believing: A Secure Template Exchange Protocol"],"prefix":"10.1007","author":[{"given":"Ileana","family":"Buhan","sequence":"first","affiliation":[]},{"given":"Jeroen","family":"Doumen","sequence":"additional","affiliation":[]},{"given":"Pieter","family":"Hartel","sequence":"additional","affiliation":[]},{"given":"Raymond","family":"Veldhuis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"94_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/11426639_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X. Boyen","year":"2005","unstructured":"Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 147\u2013163. Springer, Heidelberg (2005)"},{"key":"94_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/3-540-45789-5_24","volume-title":"Static Analysis","author":"R. Corin","year":"2002","unstructured":"Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 326\u2013341. Springer, Heidelberg (2002)"},{"key":"94_CR3","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. Information Theory, IEEE Transactions on\u00a029, 198\u2013208 (1983)","journal-title":"Information Theory, IEEE Transactions on"},{"key":"94_CR4","first-page":"10","volume-title":"ICDCS 2006","author":"M.T. Goodrich","year":"2006","unstructured":"Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human-verifiable authentication based on audio. In: ICDCS 2006. 26th IEEE International Conference on Distributed Computing Systems, Lisboa, Portugal, 4-7 July 2006, p. 10. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"94_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/3-540-44887-X_47","volume-title":"Audio-and Video-Based Biometrie Person Authentication","author":"J.P. Linnartz","year":"2003","unstructured":"Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol.\u00a02688, pp. 393\u2013402. Springer, Heidelberg (2003)"},{"key":"94_CR6","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/SP.2005.19","volume-title":"Security and Privacy, 2005 IEEE Symposium on","author":"J. McCune","year":"2005","unstructured":"McCune, J., Perrig, A., Reiter, M.: Seeing-is-believing: using camera phones for human-verifiable authentication. In: Security and Privacy, 2005 IEEE Symposium on, pp. 110\u2013124. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"94_CR7","unstructured":"NJIT: Personalized weapons technology project, progress report. Technical report, New Jersey Institute of Technology (April 2001)"},{"key":"94_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46513-8_5","volume-title":"Selected Areas in Cryptography","author":"J.O. Pliam","year":"2000","unstructured":"Pliam, J.O.: Guesswork and variation distance as measures of cipher security. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol.\u00a01758, Springer, Heidelberg (2000)"},{"key":"94_CR9","doi-asserted-by":"crossref","unstructured":"Saxena, N., Ekberg, J., Kostiainen, K., Asokan, N.: Secure device pairing based on a visual channel (short paper). SP, 306\u2013313 (2006)","DOI":"10.1109\/SP.2006.35"},{"key":"94_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/11535218_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"S. Vaudenay","year":"2005","unstructured":"Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 309\u2013326. Springer, Heidelberg (2005)"},{"key":"94_CR11","unstructured":"Veldhuis, R.N.J., Bazen, A.M., Kauffman, J.A., Hartel, P.H.: Biometric verification based on grip-pattern recognition. In: Security, Steganography, and Watermarking of Multimedia Contents VI, Proceedings of SPIE, San Jose, California, USA, January 18-22, 2004, vol.\u00a05306, pp. 634\u2013641 (2004)"},{"key":"94_CR12","first-page":"246","volume-title":"PerCom 2006 Workshops","author":"F.L. Wong","year":"2006","unstructured":"Wong, F.L., Stajano, F.: Multi-channel protocols for group key agreement in arbitrary topologies. In: PerCom 2006 Workshops. 4th IEEE Conference on Pervasive Computing and Communications Workshops, Pisa, Italy, 13-17 March 2006, pp. 246\u2013250. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"94_CR13","unstructured":"Wu, T.D.: The secure remote password protocol. In: NDSS 1998. Proceedings of the Network and Distributed System Security Symposium, San Diego, California, USA. The Internet Society (1998)"}],"container-title":["Lecture Notes in Computer Science","Advances in Biometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74549-5_94.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:23:53Z","timestamp":1619519033000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74549-5_94"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540745488","9783540745495"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74549-5_94","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}