{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:50:21Z","timestamp":1740124221100,"version":"3.37.3"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,4,6]],"date-time":"2016-04-06T00:00:00Z","timestamp":1459900800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10660-016-9222-y","type":"journal-article","created":{"date-parts":[[2016,4,6]],"date-time":"2016-04-06T00:51:24Z","timestamp":1459903884000},"page":"289-316","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0756-3765","authenticated-orcid":false,"suffix":"Jr.","given":"John H.","family":"Gerdes","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3983-972X","authenticated-orcid":false,"given":"Chin-Tser","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohamed A.","family":"Sharaf","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,4,6]]},"reference":[{"key":"9222_CR1","unstructured":"Adler, A. (2005). Vulnerabilities in biometric encryption systems, Lecture notes in computer science (LNCS) (Vol. 3546, pp. 1100\u20131109), Springer."},{"key":"9222_CR2","unstructured":"Atallah, M. J., Frikken, K. B., Goodrich, M. T. & Tamassia, R. (2005). Secure biometric authentication for weak computational devices, Lecture Notes in Computer Science, Financial Cryptography and Data Security (Vol 3570, pp. 357\u2013371). Berlin: Springer."},{"issue":"5","key":"9222_CR3","doi-asserted-by":"publisher","first-page":"529","DOI":"10.3233\/JCS-2007-15503","volume":"15","author":"A Bhargav-Spantzel","year":"2007","unstructured":"Bhargav-Spantzel, A., Squicciarini, A., & Bertino, E. (2007). Privacy preserving multi-factor authentication with biometrics. Journal of Computer Security, \n                           15(5), 529\u2013560.","journal-title":"Journal of Computer Security"},{"key":"9222_CR4","doi-asserted-by":"crossref","unstructured":"Bissessar, D., Adams, C., & Liu, D. (2014). Using biometric key commitments to prevent unauthorized lending of cryptographic credentials. In 2014 Twelfth Annual International Conference on Privacy, Security and Trust (PST) (pp. 75\u201383). Toronto, ON, July 2014.","DOI":"10.1109\/PST.2014.6890926"},{"key":"9222_CR5","unstructured":"Blanton, M., & Hudelson, W. M. P. (2009). Biometric-based non-transferable anonymous credentials, information and communication security, LNCS (vol. 5927)."},{"key":"9222_CR6","unstructured":"Bouncy Castle. (2011). Bouncy Castle Crypto APIs (v. 1.7). \n                    http:\/\/www.bouncycastle.org\/csharp\/\n                    \n                  ."},{"key":"9222_CR7","first-page":"82","volume-title":"Reusable cryptographic fuzzy extractors, 11th ACM Conf","author":"X Boyen","year":"2004","unstructured":"Boyen, X. (2004). Reusable cryptographic fuzzy extractors, 11th ACM Conf (pp. 82\u201391). Washington, DC: CCS."},{"key":"9222_CR8","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","volume-title":"Rethinking public key infrastructures and digital certificates building in privacy","author":"SA Brands","year":"2000","unstructured":"Brands, S. A. (2000). Rethinking public key infrastructures and digital certificates building in privacy. Cambridge: MIT Press."},{"issue":"1\u20132","key":"9222_CR9","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.scico.2008.09.016","volume":"74","author":"J Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H., & Kindarji, B. (2008). The best of both worlds: applying secure sketches to cancelable biometrics. Science of Computer Programming, \n                           74(1\u20132), 43\u201351.","journal-title":"Science of Computer Programming"},{"key":"9222_CR10","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H. & Kindarji, B. (2009). Anonymous identification with cancelable biometrics. In Proceedings of 6th international symposium on image and signal processing and analysis, 2009. ISPA 2009.","DOI":"10.1109\/ISPA.2009.5297678"},{"key":"9222_CR11","volume-title":"Controlling leakage of biometric information using dithering, in 16th European Signal Processing Conference (EUSIPCO)","author":"IR Buhan","year":"2008","unstructured":"Buhan, I. R., Doumen, J. M., & Hartel, P. H. (2008). Controlling leakage of biometric information using dithering, in 16th European Signal Processing Conference (EUSIPCO). Switzerland: Lausanne."},{"key":"9222_CR12","unstructured":"Burnett, A., Byrne, F., Dowling, T. & Duffy, A. (2007). A biometric identity based signature scheme. International Journal of Network Security, 5(3), 317\u2013326. \n                    http:\/\/ijns.jalaxy.com.tw\/contents\/ijns-v5-n3\/ijns-2007-v5-n3-p317-326.pdf\n                    \n                  . Accessed 16 March 2016."},{"key":"9222_CR13","unstructured":"Cavoukian, A. & Stoianov, A. (2009). Biometric encryption: The new breed of untraceable biometrics. In Boulgouris, N. V., Plataniotis, K. N., & Micheli-Tzanakou, E. (eds.), Biometrics: fundamentals, theory, and systems (Chapter 26, pp. 655\u2013718). Wiley-IEEE Press."},{"key":"9222_CR14","first-page":"182","volume-title":"Finding the Original Point Set Hidden among Chaff, Proceedings ACM Symposium ASIACCS\u201906","author":"E-C Chang","year":"2006","unstructured":"Chang, E.-C., Shen, R., & Teo, F. W. (2006). Finding the Original Point Set Hidden among Chaff, Proceedings ACM Symposium ASIACCS\u201906 (pp. 182\u2013188). Taiwan: Taipei."},{"key":"9222_CR15","unstructured":"Chowdhry, A. (2014). Forbes, MasterCard And Zwipe Unveil Credit Card With Fingerprint Scanner, October 18, 2014. \n                    http:\/\/www.forbes.com\/sites\/amitchowdhry\/2014\/10\/18\/mastercard-zwipe-fingerprint-sensor-credit-cards\/\n                    \n                  ."},{"key":"9222_CR16","unstructured":"Deswarte, Y., & Gambs, S. (2010). A Proposal for a privacy-preserving national identity card. Transactions on Data Privacy, 3, 253\u2013276. \n                    http:\/\/www.tdp.cat\/issues\/tdp.a060a10.pdf\n                    \n                  ."},{"issue":"1","key":"9222_CR17","first-page":"33","volume":"5","author":"B Dike-Anyiam","year":"2006","unstructured":"Dike-Anyiam, B., & Rehmani, Q. (2006). Biometric vs. password authentication: A user\u2019s perspective. Journal of Information Warfare, \n                           5(1), 33\u201345.","journal-title":"Journal of Information Warfare"},{"key":"9222_CR18","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L. & Smith A. (2008). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, SIAM Journal on Computing, 38(1), 97\u2013139. \n                    http:\/\/arxiv.org\/pdf\/cs.CR\/0602007\n                    \n                  . Accessed 11 Dec 2009."},{"key":"9222_CR19","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"EUROCRYPT 2004","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., & Smith, A. (2004). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. EUROCRYPT 2004 (pp. 523\u2013540). Switzerland: Interlaken."},{"key":"9222_CR20","unstructured":"Du, W., & Atallah, M. J. (2001). Secure multi-party computation problems and their applications: A review and open problems. In NSPW\u201901: Proceedings of the 2001 workshop on New security paradigms (pp. 13\u201322). ACM Press."},{"issue":"4","key":"9222_CR21","doi-asserted-by":"publisher","first-page":"1389","DOI":"10.1016\/j.patcog.2006.10.014","volume":"40","author":"J Fierrez","year":"2007","unstructured":"Fierrez, J., Ortega-Garcia, J., Torre-Toledano, D., & Gonzalez-Rodriguez, J. (2007). BioSec baseline corpus: A multimodal biometric database. Pattern Recognition, \n                           40(4), 1389\u20131392.","journal-title":"Pattern Recognition"},{"key":"9222_CR22","unstructured":"Fisher, R. A., & Yates, F. (1948) [1938]. Statistical tables for biological, agricultural and medical research (3rd edn., pp. 26\u201327). London: Oliver & Boyd."},{"key":"9222_CR23","unstructured":"FVC2006. (2006). FVC2006: The Fourth International Fingerprint Verification Competition. \n                    http:\/\/bias.csr.unibo.it\/fvc2006\/\n                    \n                  ."},{"issue":"5","key":"9222_CR24","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.cose.2008.12.005","volume":"28","author":"JH Gerdes","year":"2009","unstructured":"Gerdes, J. H., Kalvenes, J., & Huang, C.-T. (2009). Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements. Computers and Security, \n                           28(5), 248\u2013259.","journal-title":"Computers and Security"},{"key":"9222_CR25","unstructured":"Hao, F., Anderson, R. & Daugman, J. (2006). Combining Crypto with Biometrics Effectively. IEEE Transactions on Computers, 55(9), 1081\u20131088. (See also: Technical report No. 640, University of Cambridge, Computer Laboratory, July 2005. \n                    http:\/\/www.cl.cam.ac.uk\/TechReports\/\n                    \n                  )."},{"key":"9222_CR26","unstructured":"Hardekoph, B. (2015). The Big Data Breaches of 2014, Forbes. \n                    http:\/\/www.forbes.com\/sites\/moneybuilder\/2015\/01\/13\/the-big-data-breaches-of-2014\/\n                    \n                  , 1\/13\/2015."},{"key":"9222_CR27","unstructured":"Harmon, K., & Reyzin, L. (2008). An implementation of syndrome encoding and decoding for binary BCH codes, secure sketches and fuzzy extractors. \n                    http:\/\/www.cs.bu.edu\/~reyzin\/code\/fuzzy.html\n                    \n                  ."},{"key":"9222_CR28","unstructured":"Harrell, E., & Langton, L. (2012). Victims of identity theft, 2012, U.S. Department of Justice. \n                    http:\/\/www.bjs.gov\/content\/pub\/pdf\/vit12.pdf\n                    \n                  . Accessed 30 March 2016."},{"issue":"1","key":"9222_CR29","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Quarterly, \n                           28(1), 75\u2013105.","journal-title":"MIS Quarterly"},{"issue":"8","key":"9222_CR30","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1109\/34.709565","volume":"20","author":"L Hong","year":"1998","unstructured":"Hong, L., Wan, Y., & Jain, A. K. (1998). Fingerprint image enhancement: Algorithms and performance evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence, \n                           20(8), 777\u2013789.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"9222_CR31","unstructured":"ISO 2009, ISO\/IEC IS 15408-1. (2009). \n                    http:\/\/webstore.iec.ch\/preview\/info_isoiec15408-1%7Bed3.0%7Den.pdf\n                    \n                  ; current as of September 2012."},{"key":"9222_CR32","unstructured":"ITRC. (2015). Identity theft resource center breach report hits record high in 2014. Identity Theft Resource Center, January 12, 2015."},{"key":"9222_CR33","unstructured":"ITU (International Telecommunications Union). (2014). X.509: Information technology\u2014Open systems interconnection\u2014The directory: Public-key and attribute certificate frameworks. \n                    http:\/\/www.itu.int\/rec\/T-REC-X.509\n                    \n                  ."},{"key":"9222_CR34","doi-asserted-by":"publisher","unstructured":"Jain, A. K., Nandakumar, K. & Nagar, A. (2008). Biometric template security. EURASIP Journal on Advances in Signal Processing, Article ID 579416, 1\u201317, Hindawi Publishing Corporation. doi:\n                    10.1155\/2008\/579416\n                    \n                  .","DOI":"10.1155\/2008\/579416"},{"key":"9222_CR35","doi-asserted-by":"crossref","unstructured":"Jain, A. K., Prabhakar, S., Hong, L., & Pankanti, S. (2000). Filterbank-based fingerprint matching. In IEEE Transactions on Image Processing (pp. 846\u2013859).","DOI":"10.1109\/83.841531"},{"key":"9222_CR36","doi-asserted-by":"crossref","unstructured":"Kholmatov, A. & Yanikoglu, B. (2008). Realization of correlation attack against fuzzy vault scheme. In Proceedings of. security, forensics, steganography, and watermarking of multimedia contents (p. 6819).","DOI":"10.1117\/12.766861"},{"key":"9222_CR37","unstructured":"Knuth, D. E. (1969). Seminumerical algorithms. The art of computer programming 2 (pp. 139\u2013140). Reading, MA: Addison\u2013Wesley."},{"key":"9222_CR38","doi-asserted-by":"crossref","unstructured":"Liu, E., Liang, J., Pang, L., Xie, M., & Tian, J. (2010). Minutiae and modified biocode fusion for fingerprint-based key generation. Journal of Network and Computer Applications, 33(3), 221\u2013235.","DOI":"10.1016\/j.jnca.2009.12.002"},{"issue":"5","key":"9222_CR39","doi-asserted-by":"publisher","first-page":"1407","DOI":"10.1109\/TSMCB.2007.903369","volume":"37","author":"J Luping","year":"2007","unstructured":"Luping, J. (2007). Binary fingerprint image thinning using template-based PCNNs. IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics, \n                           37(5), 1407\u20131413.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics"},{"key":"9222_CR40","unstructured":"Mathews, A. (2015). Anthem: Hacked database included 78.8 million people. The Wall Street Journal. 2\/24\/2015. \n                    http:\/\/www.wsj.com\/articles\/anthem-hacked-database-included-78-8-million-people-1424807364\n                    \n                  ."},{"key":"9222_CR41","unstructured":"Nandakumar, K., A. Nagar & A. K. Jain, (2007). Hardening Fingerprint Fuzzy Vault Using Password, Proceedings of ICB 2007, Seoul, Korea, August 27-29, 2007. LNCS, Springer, 4642, 927\u2013937. \n                    http:\/\/biometrics.cse.msu.edu\/Publications\/SecureBiometrics\/NandakumarNagarJain_FpFuzzyVaultHardening_ICB2007.pdf\n                    \n                  . Accessed 15 June 2010."},{"key":"9222_CR42","unstructured":"Paquin, C. (2011). U-Prove Cryptographic Specification V1.1. \n                    http:\/\/research.microsoft.com\/pubs\/166969\/U-Prove%20Cryptographic%20Specification%20V1.1.pdf\n                    \n                  . Accessed 17 Sept 2011."},{"key":"9222_CR43","unstructured":"Paquin, C. (2011). U-Prove technology overview, V1.1. \n                    http:\/\/research.microsoft.com\/pubs\/166980\/U-Prove%20Technology%20Overview%20V1.1.pdf\n                    \n                  . Accessed 17 Sept 2011."},{"key":"9222_CR44","unstructured":"Peterson, H. (2014). How to use a \u2018fake\u2019 credit card to protect yourself from hackers, Business Insider. \n                    http:\/\/www.businessinsider.com\/abine-maskme-protects-against-hackers-2014-1\n                    \n                  ."},{"key":"9222_CR45","unstructured":"Pfitzmann, A & K\u00f6hntopp, M. (2001). Anonymity, unobservability, and pseudonymity\u2014A proposal for terminology, Lecture Notes in Computer Science # 2009 (pp. 1\u20139). Designing Privacy Enhancing Technologies, Berlin: Springer."},{"key":"9222_CR46","unstructured":"Pfitzmann, A. & Hansen, M. (2010). A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (version v0.34, Aug. 10, 2010). \n                    http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml\n                    \n                  . Accessed 16 Sept 2012."},{"key":"9222_CR47","unstructured":"Ponemon Institute. (2014). Is your company ready for a big data breach? The second annual study on data breach preparedness. Ponemon Institute, September 15, 2014. \n                    http:\/\/www.ponemon.org\/library\/is-your-company-ready-for-a-big-data-breach-the-second-annual-study-on-data-breach-preparedness\n                    \n                  . Accessed 16 April 2015."},{"key":"9222_CR48","doi-asserted-by":"crossref","unstructured":"Scheirer, W. J. & Boult, T. E. (2007). Cracking fuzzy vaults and biometric encryption. In Biometric Consortium Conference, Baltimore, Sept. 2007.","DOI":"10.1109\/BCC.2007.4430534"},{"key":"9222_CR49","unstructured":"Shoup, V. (2009). NTL: A library for doing number theory (v. 5.5.2). \n                    http:\/\/www.shoup.net\/ntl\/\n                    \n                  . Accessed 15 April 2012."},{"key":"9222_CR50","volume-title":"Cryptography and network security: principles and practice","author":"W Stallings","year":"2006","unstructured":"Stallings, W. (2006). Cryptography and network security: principles and practice (4th ed.). Englewood Cliffs: Prentice Hall.","edition":"4"},{"key":"9222_CR51","doi-asserted-by":"crossref","unstructured":"Stoianov, A., Kevenaar, T. & Van der Veen, M. (2009). Security issues of biometric encryption. In IEEE TIC-STH Symposium on Information Assurance, Biometric Security and Business Continuity (pp. 34\u201339), Sept. 2009, Toronto, Canada.","DOI":"10.1109\/TIC-STH.2009.5444478"},{"key":"#cr-split#-9222_CR52.1","unstructured":"Taherdoost, H., Sahibuddin, S., & Jalaliyoon, N. (2011). Smart card security"},{"key":"#cr-split#-9222_CR52.2","unstructured":"technology and adoption. International Journal of Security, 5(2), 74-84.   http:\/\/www.cscjournals.org\/manuscript\/Journals\/IJS\/Volume5\/Issue2\/IJS-84.pdf    . Accessed 16 March 2016."},{"key":"9222_CR53","unstructured":"Vijayan, J. (2014). Computerworld, Banks push for tokenization standard to secure credit card payments. \n                    http:\/\/www.computerworld.com\/article\/2487635\/data-security\/banks-push-for-tokenization-standard-to-secure-credit-card-payments.html\n                    \n                  ."},{"key":"9222_CR54","unstructured":"Westervelt, R., (2009). Health net healthcare data breach affects 1.5 million, SearchSecurity.com. \n                    http:\/\/searchsecurity.techtarget.com\/news\/article\/0,289142,sid14_gci1374839,00.html\n                    \n                  . Accessed 6 Nov 2009."},{"key":"9222_CR55","unstructured":"Yang, D., Xu, B., Yang, B., & Wang, J. (2012). 2012 Eighth international conference on computational intelligence and security (pp. 452\u2013456)."}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-016-9222-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-016-9222-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-016-9222-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-016-9222-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T15:59:04Z","timestamp":1581955144000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-016-9222-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,6]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["9222"],"URL":"https:\/\/doi.org\/10.1007\/s10660-016-9222-y","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"type":"print","value":"1389-5753"},{"type":"electronic","value":"1572-9362"}],"subject":[],"published":{"date-parts":[[2016,4,6]]},"assertion":[{"value":"6 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}