{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:19Z","timestamp":1747104199037,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":56,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642357541"},{"type":"electronic","value":"9783642357558"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35755-8_1","type":"book-chapter","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T11:36:02Z","timestamp":1354188962000},"page":"3-19","source":"Crossref","is-referenced-by-count":16,"title":["Biometric Privacy Protection: Guidelines and Technologies"],"prefix":"10.1007","author":[{"given":"Ruggero Donida","family":"Labati","sequence":"first","affiliation":[]},{"given":"Vincenzo","family":"Piuri","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Scotti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"International Biometrics Group, http:\/\/www.ibgweb.com"},{"issue":"6","key":"1_CR2","doi-asserted-by":"crossref","first-page":"2034","DOI":"10.1016\/j.patcog.2007.12.002","volume":"41","author":"Cancellable biometrics and annotations on biohash","year":"2008","unstructured":"Cancellable biometrics and annotations on biohash. Pattern Recognition\u00a041(6), 2034\u20132044 (2008)","journal-title":"Pattern Recognition"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Barni, M., Bianchi, T., Catalano, D., Raimondo, M.D., Donida Labati, R., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F., Piva, A.: A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates. In: IEEE Fourth International Conference on Biometrics: Theory, Applications and Systems (BTAS) (September 2010)","DOI":"10.1109\/BTAS.2010.5634527"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Barni, M., Bianchi, T., Catalano, D., Raimondo, M.D., Labati, R.D., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F., Piva, A.: Privacy-preserving fingercode authentication. In: 12th ACM Multimedia and Security Workshop (2010)","DOI":"10.1145\/1854229.1854270"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Bianchi, T., Turchi, S., Piva, A., Donida Labati, R., Piuri, V., Scotti, F.: Implementing fingercode-based identity matching in the encrypted domain. In: IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS), pp. 15\u201321 (September 2010)","DOI":"10.1109\/BIOMS.2010.5610445"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Boult, T.: Robust distance measures for face-recognition supporting revocable biometric tokens. In: International Conference on Automatic Face and Gesture Recognition, pp. 560\u2013566 (April 2006)","DOI":"10.1109\/FGR.2006.94"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Boult, T., Schdrer, W., Woodworth, R.: Revocable fingerprint biotokens: Accuracy and security analysis. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1\u20138 (June 2007)","DOI":"10.1109\/CVPR.2007.383110"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-68164-9_8","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"J. Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H.: An Authentication Protocol with Encrypted Biometric Data. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 109\u2013124. Springer, Heidelberg (2008)"},{"issue":"4","key":"1_CR9","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1109\/TIFS.2008.2002937","volume":"3","author":"J. Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Zemor, G.: Theoretical and practical boundaries of binary secure sketches. IEEE Transactions on Information Forensics and Security\u00a03(4), 673\u2013683 (2008)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-540-73458-1_8","volume-title":"Information Security and Privacy","author":"J. Bringer","year":"2007","unstructured":"Bringer, J., Chabanne, H., Izabach\u00e8ne, M., Pointcheval, D., Tang, Q., Zimmer, S.: An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol.\u00a04586, pp. 96\u2013106. Springer, Heidelberg (2007)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Cavoukian, A., Stoianov, A.: Biometric encryption. In: Encyclopedia of Cryptography and Security, 2nd edn., pp. 90\u201398 (2011)","DOI":"10.1007\/978-1-4419-5906-5_880"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.cviu.2006.01.002","volume":"102","author":"C.S. Chin","year":"2006","unstructured":"Chin, C.S., Jin, A.T.B., Ling, D.N.C.: High security iris verification system based on random secret integration. Computer Vision and Image Understanding\u00a0102, 169\u2013177 (2006)","journal-title":"Computer Vision and Image Understanding"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Cimato, F.S., Scotti, F.: A biometric verification system addressing privacy concerns. In: International Conference on Computational Intelligence and Security, pp. 594\u2013598 (December 2007)","DOI":"10.1109\/CIS.2007.117"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Daugman, J.: How iris recognition works. In: Proceedings of the International Conference on Image Processing, vol.\u00a01, pp. 33\u201336 (2002)","DOI":"10.1109\/ICIP.2002.1037952"},{"issue":"1","key":"1_CR15","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y. Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing\u00a038(1), 97\u2013139 (2008)","journal-title":"SIAM Journal on Computing"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Draper, S., Khisti, A., Martinian, E., Vetro, A., Yedidia, J.: Using distributed source coding to secure fingerprint biometrics. In: IEEE International Conference on Acoustics, Speech and Signal Processing, vol.\u00a02, pp. 29\u2013132 (April 2007)","DOI":"10.1109\/ICASSP.2007.366189"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T. El Gamal","year":"1985","unstructured":"El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 10\u201318. Springer, Heidelberg (1985)"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-03168-7_14","volume-title":"Privacy Enhancing Technologies","author":"Z. Erkin","year":"2009","unstructured":"Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-Preserving Face Recognition. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol.\u00a05672, pp. 235\u2013253. Springer, Heidelberg (2009)"},{"issue":"6","key":"1_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/MAES.2004.1308819","volume":"19","author":"M. Faundez-Zanuy","year":"2004","unstructured":"Faundez-Zanuy, M.: On the vulnerability of biometric security systems. IEEE Aerospace and Electronic Systems Magazine\u00a019(6), 3\u20138 (2004)","journal-title":"IEEE Aerospace and Electronic Systems Magazine"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security, 1\u201315 (2007)","DOI":"10.1155\/2007\/13801"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Huixian, L., Man, W., Liaojun, P., Weidong, Z.: Key binding based on biometric shielding functions. In: International Conference on Information Assurance and Security, vol.\u00a01, pp. 19\u201322 (August 2009)","DOI":"10.1109\/IAS.2009.305"},{"issue":"2","key":"1_CR22","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TIFS.2010.2046984","volume":"5","author":"T. Ignatenko","year":"2010","unstructured":"Ignatenko, T., Willems, F.: Information leakage in fuzzy commitment schemes. IEEE Transactions on Information Forensics and Security\u00a05(2), 337\u2013348 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"1_CR23","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TIFS.2010.2046984","volume":"5","author":"T. Ignatenko","year":"2010","unstructured":"Ignatenko, T., Willems, F.: Information leakage in fuzzy commitment schemes. IEEE Transactions on Information Forensics and Security\u00a05(2), 337\u2013348 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1_CR24","volume-title":"Handbook of Fingerprint Recognition","author":"A.K. Jain","year":"2003","unstructured":"Jain, A.K., Maltoni, D.: Handbook of Fingerprint Recognition. Springer-Verlag New York, Inc., Secaucus (2003)"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP Journal on Advances in Signal Processing, 1\u201317 (2008)","DOI":"10.1155\/2008\/579416"},{"key":"1_CR26","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1109\/83.841531","volume":"9","author":"A.K. Jain","year":"2000","unstructured":"Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: Filterbank-based fingerprint matching. IEEE Transactions on Image Processing\u00a09, 846\u2013859 (2000)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"11","key":"1_CR27","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"A.T.B. Jin","year":"2004","unstructured":"Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition\u00a037(11), 2245\u20132255 (2004)","journal-title":"Pattern Recognition"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Jin, Z., Teoh, A., Ong, T.S., Tee, C.: Generating revocable fingerprint template using minutiae pair representation. In: International Conference on Education Technology and Computer, vol.\u00a05 (June 2010)","DOI":"10.1109\/ICETC.2010.5529773"},{"key":"1_CR29","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. In: IEEE International Symposium on Information Theory, p. 408 (2002)"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Sixth ACM Conference on Computer and Communications Security, pp. 28\u201336 (1999)","DOI":"10.1145\/319709.319714"},{"issue":"5","key":"1_CR31","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1109\/TSMCB.2008.927261","volume":"38","author":"Y.J. Lee","year":"2008","unstructured":"Lee, Y.J., Park, K.R., Lee, S.J., Bae, K., Kim, J.: A new method for generating an invariant iris private key based on the fuzzy vault system. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics\u00a038(5), 1302\u20131313 (2008)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics"},{"key":"1_CR32","unstructured":"LLC International Biometric Group: Bioprivacy initiative (2003), http:\/\/www.bioprivacy.org\/"},{"issue":"3","key":"1_CR33","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1109\/LSP.2009.2038111","volume":"17","author":"E. Maiorana","year":"2010","unstructured":"Maiorana, E., Campisi, P.: Fuzzy commitment for function based signature template protection. IEEE Signal Processing Letters\u00a017(3), 249\u2013252 (2010)","journal-title":"IEEE Signal Processing Letters"},{"issue":"3","key":"1_CR34","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1109\/LSP.2009.2038111","volume":"17","author":"E. Maiorana","year":"2010","unstructured":"Maiorana, E., Campisi, P.: Fuzzy commitment for function based signature template protection. IEEE Signal Processing Letters\u00a017(3), 249\u2013252 (2010)","journal-title":"IEEE Signal Processing Letters"},{"issue":"3","key":"1_CR35","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TSMCA.2010.2041653","volume":"40","author":"E. Maiorana","year":"2010","unstructured":"Maiorana, E., Campisi, P., Fierrez, J., Ortega-Garcia, J., Neri, A.: Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Transaction on Systems, Man and Cybernetic, Part A: Systems and Humans\u00a040(3), 525\u2013538 (2010)","journal-title":"IEEE Transaction on Systems, Man and Cybernetic, Part A: Systems and Humans"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Makrushin, A., Scheidat, T., Vielhauer, C.: Towards robust biohash generation for dynamic handwriting using feature selection. In: International Conference on Digital Signal Processing, pp. 1\u20136 (July 2011)","DOI":"10.1109\/ICDSP.2011.6004943"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Nagar, A., Jain, A.: On the security of non-invertible fingerprint template transforms. In: First IEEE International Workshop on Information Forensics and Security (WIFS), pp. 81\u201385 (2009)","DOI":"10.1109\/WIFS.2009.5386477"},{"issue":"4","key":"1_CR38","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","volume":"2","author":"K. Nandakumar","year":"2007","unstructured":"Nandakumar, K., Jain, A., Pankanti, S.: Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security\u00a02(4), 744\u2013757 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1_CR39","doi-asserted-by":"publisher","first-page":"2390","DOI":"10.1016\/j.neucom.2006.05.001","volume":"69","author":"L. Nanni","year":"2006","unstructured":"Nanni, L., Lumini, A.: Empirical tests on biohashing. Neurocomputing\u00a069, 2390\u20132395 (2006)","journal-title":"Neurocomputing"},{"key":"1_CR40","unstructured":"Nichols, R.K.: Icsa Guide to Cryptography. McGraw-Hill Professional (1998)"},{"key":"1_CR41","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"issue":"3","key":"1_CR42","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"N.K. Ratha","year":"2001","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal\u00a040(3), 614\u2013634 (2001)","journal-title":"IBM Systems Journal"},{"issue":"4","key":"1_CR43","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"N.K. Ratha","year":"2007","unstructured":"Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Transaction on Pattern Analysis and Machine Intelligence\u00a029(4), 561\u2013572 (2007)","journal-title":"IEEE Transaction on Pattern Analysis and Machine Intelligence"},{"key":"1_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-45344-X_32","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"N.K. Ratha","year":"2001","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: An Analysis of Minutiae Matching Strength. In: Bigun, J., Smeraldi, F. (eds.) AVBPA 2001. LNCS, vol.\u00a02091, pp. 223\u2013228. Springer, Heidelberg (2001)"},{"key":"1_CR45","doi-asserted-by":"crossref","unstructured":"Rathgeb, C., Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security\u00a0(1) (2011)","DOI":"10.1186\/1687-417X-2011-3"},{"key":"1_CR46","unstructured":"RNCOS (ed.): Electronics Security: Global Biometric Forecast to 2012 (2010)"},{"key":"1_CR47","doi-asserted-by":"crossref","unstructured":"Sabena, F., Dehghantanha, A., Seddon, A.: A review of vulnerabilities in identity management using biometrics. In: Second International Conference on Future Networks (CFN), pp. 42\u201349 (January 2010)","DOI":"10.1109\/ICFN.2010.79"},{"key":"1_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-642-14423-3_16","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"A. Sadeghi","year":"2010","unstructured":"Sadeghi, A., Schneider, T., Wehrenberg, I.: Efficient Privacy-Preserving Face Recognition. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol.\u00a05984, pp. 229\u2013244. Springer, Heidelberg (2010)"},{"key":"1_CR49","doi-asserted-by":"crossref","unstructured":"Savvides, M., Vijaya Kumar, B., Khosla, P.: Cancelable biometric filters for face recognition. In: International Conference on Pattern Recognition, vol.\u00a03, pp. 922\u2013925 (August 2004)","DOI":"10.1109\/ICPR.2004.1334679"},{"key":"1_CR50","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-1-84628-984-2_9","volume-title":"Computationally Secure Authentication with Noisy Data","author":"B. Schoenmakers","year":"2007","unstructured":"Schoenmakers, B., Tuyls, P.: Computationally Secure Authentication with Noisy Data, pp. 141\u2013149. Springer, Heidelberg (2007)"},{"key":"1_CR51","doi-asserted-by":"crossref","unstructured":"Stoianov, A.: Cryptographically secure biometrics. In: Kumar, B.V.K.V., Prabhakar, S., Ross, A.A. (eds.) Biometric Technology for Human Identification VII, vol.\u00a07667, p. 76670C. SPIE (2010)","DOI":"10.1117\/12.849028"},{"issue":"3","key":"1_CR52","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1109\/TIFS.2007.902022","volume":"2","author":"Y. Sutcu","year":"2007","unstructured":"Sutcu, Y., Li, Q., Memon, N.: Protecting biometric templates with sketch: Theory and practice. IEEE Transactions on Information Forensics and Security\u00a02(3), 503\u2013512 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"12","key":"1_CR53","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1109\/TPAMI.2006.250","volume":"28","author":"A. Teoh","year":"2006","unstructured":"Teoh, A., Goh, A., Ngo, D.: Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a028(12), 1892\u20131901 (2006)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"1_CR54","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.ipl.2006.06.010","volume":"100","author":"A. Teoh","year":"2006","unstructured":"Teoh, A., Jin, B., Connie, T., Ngo, D., Ling, C.: Remarks on biohash and its mathematical foundation. Information Processing Letters\u00a0100, 145\u2013150 (2006)","journal-title":"Information Processing Letters"},{"issue":"3","key":"1_CR55","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1109\/TSMCB.2010.2098439","volume":"41","author":"Y. Wang","year":"2011","unstructured":"Wang, Y., Hatzinakos, D.: On random transformations for changeable face verification. IEEE Transaction on Systems, Man and Cybernetic, Part B: Cybernetics\u00a041(3), 840\u2013854 (2011)","journal-title":"IEEE Transaction on Systems, Man and Cybernetic, Part B: Cybernetics"},{"key":"1_CR56","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TSMCB.2009.2037131","volume":"40","author":"Y. Wang","year":"2010","unstructured":"Wang, Y., Plataniotis, K.N.: An analysis of random projection for changeable and privacy-preserving biometric verification. IEEE Transaction on Systems, Man and Cybernetic, Part B: Cybernetics\u00a040, 1280\u20131293 (2010)","journal-title":"IEEE Transaction on Systems, Man and Cybernetic, Part B: Cybernetics"}],"container-title":["Communications in Computer and Information Science","E-Business and Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35755-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T23:09:13Z","timestamp":1745363353000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-35755-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642357541","9783642357558"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35755-8_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}