{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:49Z","timestamp":1725551209797},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123672"},{"type":"electronic","value":"9783642123689"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_12","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T06:30:40Z","timestamp":1270621840000},"page":"170-182","source":"Crossref","is-referenced-by-count":5,"title":["Random Number Generation Based on Fingerprints"],"prefix":"10.1007","author":[{"given":"Shkodran","family":"Gerguri","sequence":"first","affiliation":[]},{"given":"V\u00e1clav","family":"Maty\u00e1\u0161","sequence":"additional","affiliation":[]},{"given":"Zden\u011bk","family":"\u0158\u00edha","sequence":"additional","affiliation":[]},{"given":"Lud\u011bk","family":"Smol\u00edk","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/978-3-642-04766-4_13","volume-title":"NordSec 2009","author":"J. Bouda","year":"2009","unstructured":"Bouda, J., Krhovjak, J., Matyas, V., Svenda, P.: Towards true random number generation in mobile environments. In: J\u00f8sang, A., Maseng, T., Knapskog, S.J. (eds.) NordSec 2009. LNCS, vol.\u00a05838, pp. 179\u2013189. Springer, Heidelberg (2009)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Feng, H., Wah, C.C.: Private key generation from on-line handwritten signatures. Information Management & Computer Security, 159\u2013164 (2002)","DOI":"10.1108\/09685220210436949"},{"key":"12_CR3","unstructured":"Gerguri, S., Maty\u00e1\u0161, V., \u0158\u00edha, Z., Smol\u00edk, L.: Generating random sequences from fingerprints. In: MEMICS 2008, pp. 51\u201359 (2008"},{"issue":"9","key":"12_CR4","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F. Hao","year":"2006","unstructured":"Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions on Computers\u00a055(9), 1081\u20131088 (2006)","journal-title":"IEEE Transactions on Computers"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the Sixth ACM Conference on Computer and Communications Security (1999)","DOI":"10.1145\/319709.319714"},{"key":"12_CR6","first-page":"73","volume-title":"Proceeding of the 12th Nordic Workshop on Secure IT Systems","author":"J. Krhovj\u00e1k","year":"2007","unstructured":"Krhovj\u00e1k, J., \u0160venda, P., Maty\u00e1\u0161, V.: The source of randomness in mobile devices. In: Proceeding of the 12th Nordic Workshop on Secure IT Systems, pp. 73\u201384. Reykjavik University, Kringlan 1, 103 Reykjavik (2007)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Li, X., Wu, X., Qi, N., Wang, K.: A novel cryptographic algorithm based on iris feature. In: International Conference on Computational Intelligence and Security, vol.\u00a02, pp. 463\u2013466 (2008)","DOI":"10.1109\/CIS.2008.91"},{"key":"12_CR8","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1007\/11779568_57","volume-title":"Advances in Applied Artificial Intelligence","author":"L.E.G. Casta n\u00f3n","year":"2006","unstructured":"Casta n\u00f3n, L.E.G., Reigosa, M.P., Nolazco-Flores, J.A.: Biometric-iris random key generator using generalized regression neural networks. In: Ali, M., Dapoigny, R. (eds.) IEA\/AIE 2006. LNCS (LNAI), vol.\u00a04031, pp. 530\u2013539. Springer, Heidelberg (2006)"},{"key":"12_CR9","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/11874850_22","volume-title":"Advances in Artificial Intelligence - IBERAMIA-SBIA 2006","author":"J.A. Ram\u00edrez-Ruis","year":"2006","unstructured":"Ram\u00edrez-Ruis, J.A., Pfeiffer, C.F., Nolazco-Flores, J.A.: Cryptographic keys generation using fingercodes. In: Sichman, J.S., Coelho, H., Rezende, S.O. (eds.) IBERAMIA 2006 and SBIA 2006. LNCS (LNAI), vol.\u00a04140, pp. 178\u2013187. Springer, Heidelberg (2006)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Szczepanski, J., Wajnryb, E., Amig\u00f3, J.M., Sanchez-Vives, M.V., Slater, M.: Biometric random number generators. Computers & Security\u00a023 (February 2004)","DOI":"10.1016\/S0167-4048(04)00064-1"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T21:43:51Z","timestamp":1558993431000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}