{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:49:06Z","timestamp":1725796146734},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662439357"},{"type":"electronic","value":"9783662439364"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43936-4_13","type":"book-chapter","created":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T08:05:04Z","timestamp":1403856304000},"page":"195-210","source":"Crossref","is-referenced-by-count":0,"title":["ELITE: zEro Links Identity managemenT systEm"],"prefix":"10.1007","author":[{"given":"Tarik","family":"Moataz","sequence":"first","affiliation":[]},{"given":"Nora","family":"Cuppens-Boulahia","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-10772-6_8","volume-title":"Information Systems Security","author":"M. Adjedj","year":"2009","unstructured":"Adjedj, M., Bringer, J., Chabanne, H., Kindarji, B.: Biometric Identification over Encrypted Data Made Feasible. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol.\u00a05905, pp. 86\u2013100. Springer, Heidelberg (2009)"},{"key":"13_CR2","first-page":"593","volume-title":"Proceedings of the 26th Annual ACM Symposium on Theory of Computing","author":"Y. Azar","year":"1994","unstructured":"Azar, Y., Broder, A.Z., Karlin, A.R., Upfal, E.: Balanced Allocations. In: Proceedings of the 26th Annual ACM Symposium on Theory of Computing, pp. 593\u2013602. ACM, Chicago (1994)"},{"issue":"7","key":"13_CR3","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B.H. Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/Time Trade-offs in Hash Coding with Allowable Errors. Communications of the ACM\u00a013(7), 422\u2013426 (1970)","journal-title":"Communications of the ACM"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-540-74143-5_4","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"D. Boneh","year":"2007","unstructured":"Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith III, W.E.: Public Key Encryption That Allows PIR Queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 50\u201367. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Kindarji, B.: Error-Tolerant Searchable Encryption. In: Proceedings of IEEE International Conference on Communications, Dresden, Germany, pp. 1\u20136 (June 2009)","key":"13_CR5","DOI":"10.1109\/ICC.2009.5199004"},{"issue":"12","key":"13_CR6","doi-asserted-by":"publisher","first-page":"2128","DOI":"10.1109\/TPAMI.2010.52","volume":"32","author":"R. Cappelli","year":"2010","unstructured":"Cappelli, R., Ferrara, M., Maltoni, D.: Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition. IEEE Transaction on Pattern Analysis and Machine Intelligence\u00a032(12), 2128\u20132141 (2010)","journal-title":"IEEE Transaction on Pattern Analysis and Machine Intelligence"},{"issue":"5","key":"13_CR7","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1109\/TPAMI.2010.228","volume":"33","author":"R. Cappelli","year":"2011","unstructured":"Cappelli, R., Ferrara, M., Maltoni, D.: Fingerprint Indexing Based on Minutia Cylinder-Code. IEEE Transaction on Pattern Analysis and Machine Intelligence\u00a033(5), 1051\u20131057 (2011)","journal-title":"IEEE Transaction on Pattern Analysis and Machine Intelligence"},{"unstructured":"Feller, W.: An Introduction to Probability Theory and Its Applications: Volume One. John Wiley & Sons (1968)","key":"13_CR8"},{"issue":"6","key":"13_CR9","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1214\/aop\/1176995671","volume":"5","author":"L. Host","year":"1977","unstructured":"Host, L.: Some Asymptotic Results For Occupancy Problems. The Annals of Probability\u00a05(6), 1028\u20131035 (1977)","journal-title":"The Annals of Probability"},{"doi-asserted-by":"crossref","unstructured":"Jain, A.K., Bolle, R.M., Pankanti, S.: Biometrics: Personal Identification in Networked Society. Springer (1999)","key":"13_CR10","DOI":"10.1007\/b117227"},{"doi-asserted-by":"crossref","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Journal on Advances in Signal Processing 2008 (2008)","key":"13_CR11","DOI":"10.1155\/2008\/579416"},{"doi-asserted-by":"crossref","unstructured":"Justus, B., Cuppens, F., Cuppens-Boulahia, N., Bringer, J., Chabanne, H., Cipiere, O.: Define Privacy-preserving Setbase Drawer Size Standard: A \u03b5-closeness Perspective. In: Proceedings of the 11th Annual International Conference on Privacy, Security and Trust, Tarragona, Catalonia, Spain, pp. 362\u2013365 (July 2013)","key":"13_CR12","DOI":"10.1109\/PST.2013.6596090"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-642-39256-6_19","volume-title":"Data and Applications Security and Privacy XXVII","author":"B. Justus","year":"2013","unstructured":"Justus, B., Cuppens, F., Cuppens-Boulahia, N., Bringer, J., Chabanne, H., Cipiere, O.: Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol.\u00a07964, pp. 274\u2013281. Springer, Heidelberg (2013)"},{"unstructured":"Kevenaar, T.A.M., Korte, U., Merkle, J., Niesing, M., Ihmor, H., Busch, C., Zhou, X.: A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems. In: Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, Darmstadt, Germany, pp. 45\u201356 (September 2010)","key":"13_CR14"},{"doi-asserted-by":"crossref","unstructured":"Kushilevitz, E., Ostrovsky, R., Rabani, Y.: Efficient Search for Approximate Nearest Neighbor in High Dimensional Spaces. In: Proceedings of the 30th Annual ACM Symposium on the Theory of Computing, Dallas, Texas, USA, pp. 614\u2013623 (May 1998)","key":"13_CR15","DOI":"10.1145\/276698.276877"},{"unstructured":"Mimaroglu, S., Simovici, D.A.: Approximate Computation of Object Distances by Locality-Sensitive Hashing. In: Proceedings of the 4th International Conference on Data Mining, Las Vegas, Nevada, USA, pp. 714\u2013718 (July 2008)","key":"13_CR16"},{"unstructured":"Schmidt, G.J., Soutar, C., Tomko, G.J.: Fingerprint Controlled Public Key Cryptographic System. Patent #US5541994 A. Mytec Technologies Inc. (July 1996)","key":"13_CR17"},{"unstructured":"Shamir, A.: Adding Privacy to Biometric Databases: The Setbase Approach. Presentation at the 31st International Conference of Data Protection and Privacy (2009), \n                  \n                    http:\/\/www.privacyconference2009.org\/program\/Presentaciones\/common\/pdfs\/adhi_shamir_madrid.pdf\n                  \n                  \n                 (last accessed September 23, 2013)","key":"13_CR18"},{"issue":"5","key":"13_CR19","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1103\/PhysRevLett.77.793","volume":"77","author":"A.M. Steane","year":"1996","unstructured":"Steane, A.M.: Error Correcting Codes in Quantum Theory. Physical Review Letters\u00a077(5), 793 (1996)","journal-title":"Physical Review Letters"},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1145\/1250790.1250829","volume-title":"Proceedings of the Thirty-ninth Annual ACM Symposium on Theory of Computing, STOC 2007","author":"K. Talwar","year":"2007","unstructured":"Talwar, K., Wieder, U.: Balanced Allocations: The Weighted Case. In: Proceedings of the Thirty-ninth Annual ACM Symposium on Theory of Computing, STOC 2007, pp. 256\u2013265. ACM, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXVIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43936-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T00:34:25Z","timestamp":1548894865000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43936-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662439357","9783662439364"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43936-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}