{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T17:21:34Z","timestamp":1720200094420},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T00:00:00Z","timestamp":1599264000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T00:00:00Z","timestamp":1599264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09375-7","type":"journal-article","created":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T23:09:04Z","timestamp":1599347344000},"page":"799-829","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function"],"prefix":"10.1007","volume":"80","author":[{"given":"Arpita","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"Binod K.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,5]]},"reference":[{"key":"9375_CR1","doi-asserted-by":"publisher","unstructured":"Al-Sharif S, Iqbal F, Baker T, Khattack A (2016) White-hat hacking framework for promoting security awareness. In: 2016 8th IFIP international conference on new technologies, mobility and security (NTMS), Larnaca, pp 1\u20136, https:\/\/doi.org\/10.1109\/NTMS.2016.7792489, (to appear in print)","DOI":"10.1109\/NTMS.2016.7792489"},{"key":"9375_CR2","doi-asserted-by":"publisher","unstructured":"Arpita S, Binod S (2019) A cancelable fingerprint biometric based session key establishment protocol. Multimed Tools Appl 78. https:\/\/doi.org\/10.1007\/s11042-019-7426-6","DOI":"10.1007\/s11042-019-7426-6"},{"key":"9375_CR3","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1002\/spe.2688","volume":"50","author":"T Baker","year":"2020","unstructured":"Baker T, Asim M, MacDermott \u00c1, Iqbal F, Kamoun F, Shah B, Alfandi O, Hammoudeh M (2020) A secure fog-based platform for SCADA-based IoT critical infrastructure. Softw Pract Exp 50:503\u2013518","journal-title":"Softw Pract Exp"},{"key":"9375_CR4","doi-asserted-by":"publisher","unstructured":"Barman S, Chattopadhyay S, Samanta D (2014) An approach to cryptographic key distribution through fingerprint based key distribution center. In: Communications and informatics 2014 international conference on Advances in Computing. IEEE, Delhi, pp 1629\u20131635. https:\/\/doi.org\/10.1109\/ICACCI.2014.6968299","DOI":"10.1109\/ICACCI.2014.6968299"},{"key":"9375_CR5","doi-asserted-by":"crossref","unstructured":"Barman S, Chattopadhyay S, Samanta D (2015) Fingerprint-based crypto-biometric system for network security, EURASIP Journal on Information Security 2015 (1)\u20133","DOI":"10.1186\/s13635-015-0020-1"},{"key":"9375_CR6","unstructured":"Barman S, Chattopadhyay S, Samanta D (2015) A novel secure key-exchange protocol using biometrics of the sender and receiver. Computers & Electrical Engineering"},{"key":"9375_CR7","doi-asserted-by":"publisher","unstructured":"Belal AA-M, Pingzhi F, Abir H, Thar S, Panos L (2019) An efficient queries processing model based on multi broadcast searchable keywords encryption (MBSKE). Ad Hoc Networks. 98. 102028. https:\/\/doi.org\/10.1016\/j.adhoc.2019.102028","DOI":"10.1016\/j.adhoc.2019.102028"},{"issue":"20","key":"9375_CR8","doi-asserted-by":"publisher","first-page":"12705","DOI":"10.1007\/s11042-015-3194-0","volume":"75","author":"SA Chaudhry","year":"2016","unstructured":"Chaudhry SA (2016) A secure biometric based multi-server authentication scheme for social multimedia networks. Multimed Tools Appl 75(20):12705\u201312725","journal-title":"Multimed Tools Appl"},{"key":"9375_CR9","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TIFS.2015.2489179","volume":"11","author":"F Guo","year":"2016","unstructured":"Guo F, Susilo W, Mu Y (2016) Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption. IEEE Trans Inform Forensics Secur 11:247\u201357","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"9375_CR10","doi-asserted-by":"publisher","unstructured":"Harkeerat K, Pritee K (2019) Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing. Future Generation Computer Systems. 102. https:\/\/doi.org\/10.1016\/j.future.2019.07.023","DOI":"10.1016\/j.future.2019.07.023"},{"issue":"8","key":"9375_CR11","first-page":"2055","volume":"38","author":"D He","year":"2013","unstructured":"He D, Chen Y, Chen J (2013) An Id-based three party authenticated key exchange protocol using elliptic curve cryptography for mobile commerce environments Arab. J Sci Eng 38(8):2055\u20132061","journal-title":"J Sci Eng"},{"key":"9375_CR12","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.jksus.2017.01.003","volume":"29","author":"SKH Islam","year":"2017","unstructured":"Islam SKH, Amin R, Biswas GP, et al. (2017) An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J King Saud Univ Comput Inf Sci 29:311\u2013324","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"4","key":"9375_CR13","doi-asserted-by":"publisher","first-page":"2085","DOI":"10.1007\/s11071-015-2467-5","volume":"83","author":"Q Jiang","year":"2016","unstructured":"Jiang Q, Wei F, Fu S, Ma J, Li G, Alelaiwi A (2016) Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn 83(4):2085\u20132101","journal-title":"Nonlinear Dyn"},{"key":"9375_CR14","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.patcog.2016.02.024","volume":"56","author":"Z Jin","year":"2016","unstructured":"Jin Z, Teoh A, Goi B, Tay Y (2016) Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representa- tion. Patt Recog (Elsevier) 56:50\u201360","journal-title":"Patt Recog (Elsevier)"},{"key":"9375_CR15","doi-asserted-by":"publisher","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"MK Khan","year":"2010","unstructured":"Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of Two-Factor user authentication in wireless sensor networks. Sensors 10:2450\u20132459","journal-title":"Sensors"},{"key":"9375_CR16","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.comcom.2010.02.011","volume":"34","author":"K Khurram","year":"2011","unstructured":"Khurram K, Soo-Kyun K, Khaled A (2011) Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme. Comp Commun 34:305\u2013309. https:\/\/doi.org\/10.1016\/j.comcom.2010.02.011","journal-title":"Comp Commun"},{"key":"9375_CR17","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1109\/TIFS.2015.2505630","volume":"11","author":"C Li","year":"2016","unstructured":"Li C, Hu J (2016) A Security-Enhanced Alignment-Free fuzzy Vault-Based fingerprint cryptosystem using Pair-Polar minutiae structures. IEEE Trans Inform Forensics Secur 11:543\u2013555","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"9375_CR18","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.jnca.2017.07.001","volume":"103","author":"X Li","year":"2018","unstructured":"Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo K-KR (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194\u2013204","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"9375_CR19","first-page":"236","volume":"26","author":"Y Lin","year":"2017","unstructured":"Lin Y, Ling Y, Wangke Y, Zhendong W (2017) A cancelable fuzzy vault algorithm based on transformed fingerprint feature. Chin J Electron 26 (1):236\u201346","journal-title":"Chin J Electron"},{"key":"9375_CR20","doi-asserted-by":"publisher","unstructured":"Mohamed A, Mohammed A, Dhiya A-J, Thar B, Jamila M, Abir H, Ahmed A (2019) A systematic review on the status and progress of homomorphic encryption technologies. J Inform Secur Appl 48. https:\/\/doi.org\/10.1016\/j.jisa.2019.102362","DOI":"10.1016\/j.jisa.2019.102362"},{"key":"9375_CR21","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.compeleceng.2018.01.028","volume":"69","author":"G Panchal","year":"2018","unstructured":"Panchal G, Samanta D (2018) A novel approach to fingerprint biometric-based cryptographic key generation and its applications to storage security. Comput Electr Eng 69:461\u2013478","journal-title":"Comput Electr Eng"},{"key":"9375_CR22","doi-asserted-by":"crossref","unstructured":"Panchal G, Samanta D (2017) Directional Area Based Minutiae Selection and Cryptographic Key Generation Using Biometric Fingerprint. In: Satapathy S, Prasad V, Rani B, Udgata, Raju K (eds) Proceedings of the First International Conference on Computational Intelligence and Informatics. Advances in Intelligent Systems and Computing, vol 507. Springer, Singapore","DOI":"10.1007\/978-981-10-2471-9_48"},{"key":"9375_CR23","doi-asserted-by":"crossref","unstructured":"Panchal G, Samanta D, Barman S (2017) Biometric-based cryptography for digital content protection without any key storage, Multimedia Tools and Applications 1-22","DOI":"10.1007\/s11042-017-4528-x"},{"key":"9375_CR24","doi-asserted-by":"crossref","unstructured":"Pu Q, Zhao X, Ding J (2009) Cryptanalysis of a three-party authenticated key exchange protocol using elliptic curve cryptography. In: Proceedings of the international conference on research challenges in computer science, pp 7\u201310","DOI":"10.1109\/ICRCCS.2009.11"},{"key":"9375_CR25","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.future.2017.07.040","volume":"84","author":"F Qi","year":"2018","unstructured":"Qi F, He D, Zeadally S, Wang H (2018) Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. Future Gener Comp Sy 84:239\u2013251","journal-title":"Future Gener Comp Sy"},{"key":"9375_CR26","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S (2010) A Statistical Test Suite for Random andPseudorandom Number Generators for Cryptographic Applications. National Institute of Standards and Technology Special Publication 800-22 revision 1a Natl. Inst Stand Technol Spec Publ 800\u2013131"},{"key":"9375_CR27","doi-asserted-by":"crossref","unstructured":"Sarkar A, Kr Singh B (2018) Cryptographic key generation from cancelable fingerprint templates. In: 4th IEEE International conference on Recent Advances in information Technology Proceedings of RAIT, Volume-I ISBN No-978-1-5378-3038-9\/18","DOI":"10.1109\/RAIT.2018.8389007"},{"key":"9375_CR28","doi-asserted-by":"crossref","unstructured":"Sarkar A, Singh BK (2018) Cryptographic key generation from cancelable fingerprint templates. In: Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, 15\u201317, pp 1\u20136","DOI":"10.1109\/RAIT.2018.8389007"},{"key":"9375_CR29","doi-asserted-by":"crossref","unstructured":"Sarkar A, Singh B, Bhaumik U (2018) Cryptographic key generation scheme from cancelable biometrics. In: Progress in computing, analytics and networking. Springer, Singapore, pp 265\u2013272","DOI":"10.1007\/978-981-10-7871-2_26"},{"key":"9375_CR30","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.future.2016.10.004","volume":"68","author":"K Saru","year":"2017","unstructured":"Saru K, Li X, Wu F, Das AK, Kwang K, Choo R, Shen J (2017) Design of a provably secure biometricsbased multi-cloud-server authentication scheme. Future Gener Comp Sy 68:320\u2013330","journal-title":"Future Gener Comp Sy"},{"key":"9375_CR31","first-page":"5e","volume-title":"Cryptography and network security: principles and practice","author":"W Stallings","year":"2010","unstructured":"Stallings W (2010) Cryptography and network security: principles and practice. Prentice Hall, Englewood Cliffs, p 5e"},{"issue":"5","key":"9375_CR32","doi-asserted-by":"publisher","first-page":"436","DOI":"10.4304\/jcm.5.5.436-443","volume":"5","author":"Z Tan","year":"2010","unstructured":"Tan Z (2010a) An enhanced three-party authentication key exchange protocol for mobile commerce environments. J Commun 5(5):436\u2013443","journal-title":"J Commun"},{"issue":"4","key":"9375_CR33","doi-asserted-by":"publisher","first-page":"120","DOI":"10.4156\/jcit.vol5.issue4.13","volume":"5","author":"Z Tan","year":"2010","unstructured":"Tan Z (2010b) An improvement on a three party authentication key exchange protocol using elliptic curve cryptography. J Convergence Inf Technol 5(4):120\u2013129","journal-title":"J Convergence Inf Technol"},{"issue":"4","key":"9375_CR34","doi-asserted-by":"publisher","first-page":"61","DOI":"10.2478\/cait-2018-0048","volume":"18","author":"S Usha","year":"2018","unstructured":"Usha S, Kuppuswami S, Karthik M (2018) A new enhanced authentication mechanism using session key agreement ProtocolNovember. Cybern Inform Technol 18(4):61\u201374. https:\/\/doi.org\/10.2478\/cait-2018-0048","journal-title":"Cybern Inform Technol"},{"key":"9375_CR35","doi-asserted-by":"publisher","unstructured":"Vivekanandan M, Sastry VN, Reddy US (2019) Biometric based User authentication protocol for mobile cloud environment. In: 2019 IEEE 5th international conference on identity, security, and behavior analysis (ISBA), Hyderabad, India, pp 1\u20136, https:\/\/doi.org\/10.1109\/ISBA.2019.8778529, (to appear in print)","DOI":"10.1109\/ISBA.2019.8778529"},{"key":"9375_CR36","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.jss.2009.03.075","volume":"82","author":"JH Yang","year":"2009","unstructured":"Yang JH, Chang CC (2009) An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. J Syst Softw 82:1497\u20131502. https:\/\/doi.org\/10.1016\/j.jss.2009.03.075","journal-title":"J Syst Softw"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09375-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09375-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09375-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T23:37:20Z","timestamp":1630798640000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09375-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,5]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9375"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09375-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,5]]},"assertion":[{"value":"11 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}