{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:06:51Z","timestamp":1758265611018},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T00:00:00Z","timestamp":1159833600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2006,10,20]]},"DOI":"10.1007\/s10044-006-0048-4","type":"journal-article","created":{"date-parts":[[2006,10,2]],"date-time":"2006-10-02T11:03:53Z","timestamp":1159787033000},"page":"359-376","source":"Crossref","is-referenced-by-count":22,"title":["An asymmetric fingerprint matching algorithm for Java Card TM"],"prefix":"10.1007","volume":"9","author":[{"given":"Stefano","family":"Bistarelli","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Santini","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Vaccarelli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,10,3]]},"reference":[{"key":"48_CR1","doi-asserted-by":"crossref","unstructured":"Bistarelli S, Santini F, Vaccarelli A (2005) An asymmetric fingerprint matching algorithm for java cardTM. In: Proceedings of AVBPA 2005. Springer, Berlin Heidelberg New York, pp 279\u2013289","DOI":"10.1007\/11527923_29"},{"key":"48_CR2","unstructured":"Jain AK, Maltoni D (2003) Handbook of fingerprint recognition. Springer, Berlin Heidelberg New York, Secaucus, NJ"},{"key":"48_CR3","volume-title":"Advances in Fingerprint Technology","author":"HC Lee","year":"1991","unstructured":"Lee HC, Gaensslen RE (1991) Advances in fingerprint technology. Elsevier, New York"},{"issue":"8","key":"48_CR4","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/TPAMI.2002.1023799","volume":"24","author":"S Pankanti","year":"2002","unstructured":"Pankanti S, Prabhakar S, Jain AK (2002) On the individuality of fingerprints. IEEE Trans Pattern Anal Mach Intell 24(8):1010\u20131025","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"48_CR5","doi-asserted-by":"crossref","unstructured":"Hatano T, Adachi T, Shigematsu S, Morimura H, Onishi S, Okazaki Y, Kyuragi H (2002) A fingerprint verification algorithm using the differential matching rate. In: ICPR \u201902: proceedings of the 16th international conference on pattern recognition (ICPR\u201902), vol 3. IEEE Computer Society, Washington, pp 799\u2013802","DOI":"10.1109\/ICPR.2002.1048139"},{"key":"48_CR6","unstructured":"Bazen AM, Verwaaijen GTB, Gerez SH, Veelenturf LPJ, van der Zwaag BJ (2000) A correlation-based fingerprint verification system. In: Proceedings of the ProRISC workshop on circuits, systems and signal processing, Veldhoven, The Netherlands. STW Technology Foundation, pp 205\u2013213"},{"key":"48_CR7","doi-asserted-by":"crossref","unstructured":"Takeda M, Uchida S, Hiramatsu K, Matsunami T (1990) Finger image identification method for personal verification. In: 10th international conference on pattern recognition, vol 1. IEEE Computer Society,Washington, DC, pp 761\u2013766","DOI":"10.1109\/ICPR.1990.118212"},{"key":"48_CR8","doi-asserted-by":"crossref","unstructured":"Kaymaz E, Mitra S (1993) Analysis and matching of degraded and noisy fingerprints. In: Tescher AG (ed) proceedings of SPIE, vol 1771, Applications of digital image processing XV, pp 498\u2013509","DOI":"10.1117\/12.139096"},{"issue":"5","key":"48_CR9","doi-asserted-by":"crossref","first-page":"846","DOI":"10.1109\/83.841531","volume":"9","author":"AK Jain","year":"2000","unstructured":"Jain AK, Prabhakar S, Hong L, Pankanti S (2000) Filterbank-based fingerprint matching. IEEE Trans Image Process 9(5):846\u2013859","journal-title":"IEEE Trans Image Process"},{"key":"48_CR10","doi-asserted-by":"crossref","unstructured":"Stosz JD, Alyea LA (1994) Automated system for fingerprint authentication using pores and ridge structure. In: David Murley J, Richard J. Mammone (eds) proceedings of automatic systems for the identification and inspection of humans (SPIE), vol 2277. IEEE Computer Society, Washington, DC, pp 210\u2013223","DOI":"10.1117\/12.191885"},{"issue":"8","key":"48_CR11","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1109\/34.531800","volume":"18","author":"NK Ratha","year":"1996","unstructured":"Ratha NK, Karu K, Chen S, Jain AK (1996) A real-time matching system for large fingerprint databases. IEEE Trans Pattern Anal Mach Intell 18(8):799\u2013813","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"48_CR12","doi-asserted-by":"crossref","unstructured":"Bistarelli S, Boffi G, Rossi F (2003) Computer algebra for fingerprint matching. In: International conference on computational science ICCS03, vol 2657\/2003, pp 811\u2013820","DOI":"10.1007\/3-540-44860-8_84"},{"issue":"4","key":"48_CR13","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1109\/34.587996","volume":"19","author":"AK Jain","year":"1997","unstructured":"Jain AK, Hong L, Bolle RM (1997) On-line fingerprint verification. IEEE Trans Pattern Anal Mach Intell 19(4):302\u2013314","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"48_CR14","unstructured":"Luo X, Tian J, Wu Y (2000) A minutiae matching algorithm in fingerprint verification. In: 15th international conference on pattern recognition, vol 4. IEEE Computer Society, Washington, DC, pp 210\u2013223"},{"key":"48_CR15","first-page":"1042","volume":"02","author":"X Jiang","year":"2000","unstructured":"Jiang X, Yau W-Y (2000) Fingerprint minutiae matching based on the local and global structures. icpr 02:1042\u20131045","journal-title":"icpr"},{"key":"48_CR16","doi-asserted-by":"crossref","unstructured":"Ratha NK, Bolle RM, Pandit VD, Vaish V (2000) Robust fingerprint authentication using local structural similarity. In: 5th IEEE workshop on applications of computer vision. IEEE Computer Society, Washington, DC, pp 29\u201334","DOI":"10.1109\/WACV.2000.895399"},{"issue":"8","key":"48_CR17","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1016\/0031-3203(90)90134-7","volume":"23","author":"AK Hrechak","year":"1990","unstructured":"Hrechak AK, McHugh JA (1990) Automated fingerprint recognition using structural matching. Pattern Recognit 23(8):893\u2013904","journal-title":"Pattern Recognit"},{"issue":"11","key":"48_CR18","doi-asserted-by":"crossref","first-page":"1793","DOI":"10.1016\/S0031-3203(99)00182-X","volume":"33","author":"K-C Fan","year":"2000","unstructured":"Fan K-C, Liu CW, Wang Y-K (2000) A randomized approach with geometric constraints to fingerprint verification. Pattern Recognit 33(11):1793\u20131803","journal-title":"Pattern Recognit"},{"issue":"2","key":"48_CR19","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/S0031-3203(00)00003-0","volume":"34","author":"AJ Willis","year":"2001","unstructured":"Willis AJ, Myers L (2001) A cost-effective fingerprint recognition systems for use with low-quality prints and damaged fingerprints. Proc Pattern Recognit 34(2):255\u2013270","journal-title":"Proc Pattern Recognit"},{"issue":"11","key":"48_CR20","doi-asserted-by":"crossref","first-page":"1266","DOI":"10.1109\/34.888711","volume":"22","author":"ZM Kovacs-Vajna","year":"2000","unstructured":"Kovacs-Vajna ZM (2000) A fingerprint verification system based on triangular matching and dynamic time warping. IEEE Trans Pattern Anal Mach Intell 22(11):1266\u20131276","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"5","key":"48_CR21","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/TPAMI.2003.1195995","volume":"25","author":"B Bhanu","year":"2003","unstructured":"Bhanu B, Tan X (2003) Fingerprint indexing based on novel features of minutiae triplets. IEEE Trans Pattern Anal Mach Intell 25(5):616\u2013622","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"48_CR22","doi-asserted-by":"crossref","unstructured":"Jain AK, Ross A, Prabhakar S (2001) Fingerprint matching using minutiae and textures features. In: Proceedings of international conference on image processing (ICIP), Thessaloniki, Greece, pp 282\u2013285","DOI":"10.1109\/ICIP.2001.958106"},{"key":"48_CR23","unstructured":"ISO 7816: integrated circuit(s) cards with contacts\u2014part 1, 1998. International Standardization Organization, JTC 1\/SC 17"},{"key":"48_CR24","unstructured":"Enrique Ortiz C (2003) An introduction to Java CardTM technology, Parts 1-2-3, Java Developer Web Site"},{"key":"48_CR25","volume-title":"Java Card Technology for Smart Cards: Architecture and Programmer\u2019s Guide","author":"Z Chen","year":"2000","unstructured":"Chen Z (2000) Java Card technology for smart cards: architecture and programmer\u2019s guide. Addison-Wesley, Longman Publishing Co., Inc., Boston"},{"key":"48_CR26","doi-asserted-by":"crossref","unstructured":"Ratha NK, Connell JH, Bolle RM (2001) An analysis of minutiae matching strength. In: AVBPA \u201901: proceedings of the 3rd international conference on audio- and video-based biometric person authentication. Springer, London, pp 223\u2013228","DOI":"10.1007\/3-540-45344-X_32"},{"key":"48_CR27","doi-asserted-by":"crossref","unstructured":"Kocher PC, Jaffe J, Jun B (1999) Differential power analysis. In: CRYPTO \u201999: proceedings of the 19th annual international cryptology conference on advances in cryptology. Springer, London, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"48_CR28","unstructured":"Pan SB, Moon D, Gil Y, Ahn D, Chung Y (2003) An ultra-low memory fingerprint matching algorithm and its implementation on a 32-bit smart card. In: IEEE transactions on consumer electronics, vol 49. IEEE Computer Society, Washington, pp 453\u2013459"},{"key":"48_CR29","unstructured":"Moon YS, Ho HC, Ng KL, Wan SF, Wong ST (2000) Collaborative fingerprint authentication by smart card and atrusted host. In: Canadian conference on electrical and computer engineering, vol 1. IEEE Computer Society, Washington, pp 108\u2013112"},{"key":"48_CR30","doi-asserted-by":"crossref","unstructured":"Reisman J, Uludag U, Ross A (2005) Secure fingerprint matching with external registration. AVBPA 720\u2013729","DOI":"10.1007\/11527923_75"},{"issue":"7","key":"48_CR31","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1016\/S0031-3203(02)00349-7","volume":"36","author":"A Ross","year":"2003","unstructured":"Ross A, Jain AK, Reisman J (2003) A hybrid fingerprint matcher. Pattern Recognit J 36(7):1661\u20131673","journal-title":"Pattern Recognit J"},{"key":"48_CR32","unstructured":"Ishida S, Mimura M, Seto Y (2001) Development of personal authentication techniques using fingerprint matching embedded in smart cards. In: EICE transactions on information and systems, vol E84-D, pp 812\u2013818"},{"key":"48_CR33","doi-asserted-by":"crossref","unstructured":"Tang TY, Moon YS, Chan KC (2004) Efficient implementation of fingerprint verification for mobile embedded systems using fixed-point arithmetic. In: SAC \u201904: proceedings of the 2004 ACM symposium on applied computing. ACM Press, New York, pp 821\u2013825","DOI":"10.1145\/967900.968070"},{"key":"48_CR34","doi-asserted-by":"crossref","unstructured":"Yang S, Verbauwhede I (2003) A secure fingerprint matching technique. In: WBMA \u201903: proceedings of the 2003 ACM SIGMM workshop on biometrics methods and applications. ACM Press, New York, pp 89\u201394","DOI":"10.1145\/982507.982524"},{"key":"48_CR35","doi-asserted-by":"crossref","unstructured":"Cucinotta T, Brigo R, Di Natale M (2004) Hybrid fingerprint matching on programmable smart cards. TrustBus 232\u2013241","DOI":"10.1007\/978-3-540-30079-3_24"},{"key":"48_CR36","unstructured":"van Wamelen P, Li Z, Iyengar S (2000) A fast algorithm for the point pattern matching problem. Technical report 1999-28, Louisiana State University, Dept. of Mathematics"},{"key":"48_CR37","doi-asserted-by":"crossref","unstructured":"Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2004) Fvc2004: third fingerprint verification competition. ICBA 1\u20137","DOI":"10.1007\/978-3-540-25948-0_1"},{"key":"48_CR38","doi-asserted-by":"crossref","unstructured":"Cappelli R, Maio D, Maltoni D, Wayman JL, Jain AK (2006) Performance evaluation of fingerprint verification systems. In: IEEE transactions on pattern analysis machine intelligence, vol 28. IEEE Computer Society, Washington, pp 3\u201318","DOI":"10.1109\/TPAMI.2006.20"},{"key":"48_CR39","unstructured":"National Institute of Standards and Technology. User\u2019s guide to NIST fingerprint image software (NFIS). NISTIR 6813"},{"key":"48_CR40","unstructured":"NIST\/Biometric Consortium Interoperability, Assurance, and Performance Working Group 7. Java CardTM Biometric API White Paper (Working Document), August 2002. Version 1.1"},{"key":"48_CR41","unstructured":"Java Card ForumTM official, web site: http:\/\/www.javacardforum.org\/"},{"key":"48_CR42","doi-asserted-by":"crossref","unstructured":"Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) Fvc2002: second fingerprint verification competition. ICPR (3):811\u2013814","DOI":"10.1109\/ICPR.2002.1048144"},{"issue":"3","key":"48_CR43","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1109\/34.990140","volume":"24","author":"D Maio","year":"2002","unstructured":"Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) Fvc2000: fngerprint verification competition. IEEE Trans Pattern Anal Mach Intell 24(3):402\u2013412","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"48_CR44","unstructured":"Watson CI, Wilson CL (1992) Nist secial dtabase 4. Fingerprint database"},{"key":"48_CR45","doi-asserted-by":"crossref","unstructured":"Ortega-Garcia J, Fierrez-Aguilar J, Simon D, Gonzalez J, Faundez-ZanuyM, Espinosa V, Satue A, Hernaez I, Igarza JJ, Vivaracho C, Escudero D, Moro QI (2003) Mcyt baseline corpus: a bimodal biometric database. IEE Proc Vis Image Signal Process 150(6):395\u2013401","DOI":"10.1049\/ip-vis:20031078"},{"key":"48_CR46","unstructured":"Biometrika s.r.l., web site: http:\/\/www.biometrika.it"},{"key":"48_CR47","unstructured":"Institute of informatics and telematics (c.n.r.), biometric group web site: http:\/\/www.iit.cnr.it\/organizzazione\/sicurezza_informazione\/ biometria\/index.htm"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-006-0048-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10044-006-0048-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-006-0048-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T08:02:26Z","timestamp":1559116946000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10044-006-0048-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,3]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2006,10,20]]}},"alternative-id":["48"],"URL":"https:\/\/doi.org\/10.1007\/s10044-006-0048-4","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,10,3]]}}}