{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:11Z","timestamp":1747104191603},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642107719"},{"type":"electronic","value":"9783642107726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10772-6_8","type":"book-chapter","created":{"date-parts":[[2009,11,13]],"date-time":"2009-11-13T07:37:49Z","timestamp":1258097869000},"page":"86-100","source":"Crossref","is-referenced-by-count":25,"title":["Biometric Identification over Encrypted Data Made Feasible"],"prefix":"10.1007","author":[{"given":"Michael","family":"Adjedj","sequence":"first","affiliation":[]},{"given":"Julien","family":"Bringer","sequence":"additional","affiliation":[]},{"given":"Herv\u00e9","family":"Chabanne","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Kindarji","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Ballard, L., Kamara, S., Reiter, M.K.: The practical subtleties of biometric key generation. In: van Oorschot, P.C. (ed.) [18], pp. 61\u201374"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-74143-5_30","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"M. Bellare","year":"2007","unstructured":"Bellare, M., Boldyreva, A., O\u2019Neill, A.: Deterministic and Efficiently Searchable Encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 535\u2013552. Springer, Heidelberg (2007)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 506\u2013522. Springer, Heidelberg (2004)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-540-74143-5_4","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"D. Boneh","year":"2007","unstructured":"Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith III, W.E.: Public Key Encryption That Allows PIR Queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 50\u201367. Springer, Heidelberg (2007)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Kindarji, B.: Error-tolerant searchable encryption. In: IEEE International Conference on Communications, 2009. ICC 2009, June 2009, pp. 1\u20136 (2009)","DOI":"10.1109\/ICC.2009.5199004"},{"key":"8_CR6","unstructured":"Bringer, J., Chabanne, H., Kindarji, B.: Identification with encrypted biometric data. CoRR\u00a0abs\/0901.1062 (2009) Full version of [5]"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","first-page":"442","volume-title":"Applied Cryptography and Network Security","author":"Y.C. Chang","year":"2005","unstructured":"Chang, Y.C., Mitzenmacher, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 442\u2013455. Springer, Heidelberg (2005)"},{"issue":"6","key":"8_CR8","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private Information Retrieval. J. ACM\u00a045(6), 965\u2013981 (1998)","journal-title":"J. ACM"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/1180405.1180417","volume-title":"CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security","author":"R. Curtmola","year":"2006","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In: CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security, pp. 79\u201388. ACM, New York (2006)"},{"issue":"11","key":"8_CR10","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/34.244676","volume":"15","author":"J. Daugman","year":"1993","unstructured":"Daugman, J.: High Confidence Visual Recognition of Persons by a Test of Statistical Independence. IEEE Trans. Pattern Anal. Mach. Intell.\u00a015(11), 1148\u20131161 (1993)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Fredman, M.L., Koml\u00f3s, J., Szemer\u00e9di, E.: Storing a Sparse Table with O(1) Worst Case Access Time. ACM\u00a031 (1984)","DOI":"10.1145\/828.1884"},{"key":"8_CR12","unstructured":"Goh, E.-J.: Secure Indexes. Cryptology ePrint Archive, Report 2003\/216 (2003), http:\/\/eprint.iacr.org\/2003\/216\/"},{"issue":"2","key":"8_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/TIFS.2008.920726","volume":"3","author":"F. Hao","year":"2008","unstructured":"Hao, F., Daugman, J., Zielinski, P.: A Fast Search Algorithm for a Large Fuzzy Database. IEEE Transactions on Information Forensics and Security\u00a03(2), 203\u2013212 (2008)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Indyk, P., Motwani, R.: Approximate Nearest Neighbors: Towards Removing the Curse of Dimensionality. In: Symposium on the Theory of Computing (1998)","DOI":"10.1145\/276698.276876"},{"key":"8_CR15","unstructured":"Liu, X., Bowyer, K.W., Flynn, P.J.: Iris Recognition and Verification Experiments with Improved Segmentation Method. In: Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID), Buffalo, New York, October 17-18 (2005)"},{"key":"8_CR16","unstructured":"National Institute of Standards and Technology (NIST). Iris Challenge Evaluation (2005), http:\/\/iris.nist.gov\/ICE"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Sedghi, S., van Liesdonk, P., Doumen, J.M., Hartel, P.H., Jonker, W.: Adaptively Secure Computationally Efficient Searchable Symmetric Encryption. Technical Report TR-CTIT-09-13 (April 2009)","DOI":"10.1007\/978-3-642-15546-8_7"},{"key":"8_CR18","unstructured":"van Oorschot, P.C. (ed.): Proceedings of the 17th USENIX Security Symposium, San Jose, CA, USA, July 28-August 1. USENIX Association (2008)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10772-6_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:34:43Z","timestamp":1606185283000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10772-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642107719","9783642107726"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10772-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}