{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T04:04:15Z","timestamp":1743653055649,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642314094"},{"type":"electronic","value":"9783642314100"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31410-0_5","type":"book-chapter","created":{"date-parts":[[2012,6,20]],"date-time":"2012-06-20T06:26:59Z","timestamp":1340173619000},"page":"67-81","source":"Crossref","is-referenced-by-count":3,"title":["Fuzzy Vault for Multiple Users"],"prefix":"10.1007","author":[{"given":"Julien","family":"Bringer","sequence":"first","affiliation":[]},{"given":"Herv\u00e9","family":"Chabanne","sequence":"additional","affiliation":[]},{"given":"M\u00e9lanie","family":"Favre","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"5_CR1","first-page":"1294","volume":"4","author":"S.H. Chae","year":"2010","unstructured":"Chae, S.H., Lim, S.J., Bae, S.H., Chung, Y., Pan, S.B.: Parallel processing of the fuzzy fingerprint vault based on geometric hashing. TIIS\u00a04(6), 1294\u20131310 (2010)","journal-title":"TIIS"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/11599548_31","volume-title":"Information Security and Cryptology","author":"Y. Chung","year":"2005","unstructured":"Chung, Y., Moon, D., Lee, S., Jung, S., Kim, T., Ahn, D.: Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol.\u00a03822, pp. 358\u2013369. Springer, Heidelberg (2005)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Guruswami, V.: Linear-algebraic list decoding of folded Reed Solomon codes. In: IEEE Conference on Computational Complexity, pp. 77\u201385. IEEE Computer Society (2011)","DOI":"10.1109\/CCC.2011.22"},{"issue":"1","key":"5_CR5","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/TIT.2007.911222","volume":"54","author":"V. Guruswami","year":"2008","unstructured":"Guruswami, V., Rudra, A.: Explicit codes achieving list decoding capacity: Error-correction with optimal redundancy. IEEE Transactions on Information Theory\u00a054(1), 135\u2013150 (2008)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Guruswami, V., Sudan, M.: Improved decoding of Reed Solomon and algebraic-geometric codes. In: FOCS, pp. 28\u201339. IEEE Computer Society (1998)","DOI":"10.1109\/SFCS.1998.743426"},{"key":"5_CR7","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE International Symposium on Information Theory, ISIT. LNCS, p. 408 (2002)"},{"issue":"2","key":"5_CR8","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A. Juels","year":"2006","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptography\u00a038(2), 237\u2013257 (2006)","journal-title":"Des. Codes Cryptography"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-540-71629-7_49","volume-title":"Adaptive and Natural Computing Algorithms","author":"S. Lee","year":"2007","unstructured":"Lee, S., Moon, D., Jung, S., Chung, Y.: Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table. In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds.) ICANNGA 2007, Part II. LNCS, vol.\u00a04432, pp. 432\u2013439. Springer, Heidelberg (2007)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Li, J., Yang, X., Tian, J., Shi, P., Li, P.: Topological structure-based alignment for fingerprint fuzzy vault. In: 19th International Conference on Pattern Recognition (ICPR 2008), Tampa, Florida, USA, December 8-11, pp. 1\u20134 (2008)","DOI":"10.1109\/ICPR.2008.4761857"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1007\/978-3-642-01793-3_94","volume-title":"Advances in Biometrics","author":"P. Li","year":"2009","unstructured":"Li, P., Yang, X., Cao, K., Shi, P., Tian, J.: Security-Enhanced Fuzzy Fingerprint Vault Based on Minutiae\u2019s Local Ridge Information. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol.\u00a05558, pp. 930\u2013939. Springer, Heidelberg (2009)"},{"issue":"3","key":"5_CR12","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.jnca.2009.12.003","volume":"33","author":"P. Li","year":"2010","unstructured":"Li, P., Yang, X., Cao, K., Tao, X., Wang, R., Tian, J.: An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J. Network and Computer Applications\u00a033(3), 207\u2013220 (2010)","journal-title":"J. Network and Computer Applications"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-642-12159-3_23","volume-title":"Artificial Neural Networks in Pattern Recognition","author":"S.J. Lim","year":"2010","unstructured":"Lim, S.J., Chae, S.-H., Pan, S.B.: VLSI Architecture of the Fuzzy Fingerprint Vault System. In: Schwenker, F., El Gayar, N. (eds.) ANNPR 2010. LNCS, vol.\u00a05998, pp. 252\u2013258. Springer, Heidelberg (2010)"},{"key":"5_CR14","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The theory of error correcting codes. North-Holland Pub. Co. (1977)"},{"key":"5_CR15","unstructured":"Merkle, J., Niesing, M., Schwaiger, M., Ihmor, H., Korte, U.: Performance of the fuzzy vault for multiple fingerprints. In: Br\u00f6mme, A., Busch, C. (eds.) BIOSIG. LNI, vol. 164, pp. 57\u201372. GI (2010)"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/978-3-540-74484-9_100","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2007","author":"D. Moon","year":"2007","unstructured":"Moon, D., Lee, S., Jung, S., Chung, Y., Park, M., Yi, O.: Fingerprint Template Protection Using Fuzzy Vault. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol.\u00a04707, pp. 1141\u20131151. Springer, Heidelberg (2007)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Nagar, A., Nandakumar, K., Jain, A.K.: Securing fingerprint template: Fuzzy vault with minutiae descriptors. In: 19th International Conference on Pattern Recognition (ICPR 2008), Tampa, Florida, USA, December 8-11, pp. 1\u20134 (2008)","DOI":"10.1109\/ICPR.2008.4761459"},{"issue":"4","key":"5_CR18","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","volume":"2","author":"K. Nandakumar","year":"2007","unstructured":"Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security\u00a02(4), 744\u2013757 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1007\/978-3-540-74549-5_97","volume-title":"Advances in Biometrics","author":"K. Nandakumar","year":"2007","unstructured":"Nandakumar, K., Nagar, A., Jain, A.K.: Hardening Fingerprint Fuzzy Vault Using Password. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol.\u00a04642, pp. 927\u2013937. Springer, Heidelberg (2007)"},{"key":"5_CR20","unstructured":"Rudra, A.: List Decoding and Property Testing of Error Correcting Codes. Ph.D. thesis, University of Washington (2007)"},{"key":"5_CR21","unstructured":"Smith, A.D.: Maintaining secrecy when information leakage is unavoidable. Ph.D. thesis, Cambridge, MA, USA (2004), aAI0807529"},{"issue":"1","key":"5_CR22","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1006\/jcom.1997.0439","volume":"13","author":"M. Sudan","year":"1997","unstructured":"Sudan, M.: Decoding of Reed Solomon codes beyond the error-correction bound. J. Complexity\u00a013(1), 180\u2013193 (1997)","journal-title":"J. Complexity"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/11527923_32","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"U. Uludag","year":"2005","unstructured":"Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for Fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol.\u00a03546, pp. 310\u2013319. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - AFRICACRYPT 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31410-0_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T07:35:32Z","timestamp":1743579332000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31410-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642314094","9783642314100"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31410-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}