{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T10:27:17Z","timestamp":1649068037531},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,2,27]],"date-time":"2011-02-27T00:00:00Z","timestamp":1298764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s11623-011-0047-5","type":"journal-article","created":{"date-parts":[[2011,2,26]],"date-time":"2011-02-26T16:18:43Z","timestamp":1298737123000},"page":"183-191","source":"Crossref","is-referenced-by-count":0,"title":["Biometric Template Protection"],"prefix":"10.1007","volume":"35","author":[{"given":"Christoph","family":"Busch","sequence":"first","affiliation":[]},{"given":"Ulrike","family":"Korte","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Abt","sequence":"additional","affiliation":[]},{"given":"Christian","family":"B\u00f6hm","sequence":"additional","affiliation":[]},{"given":"Ines","family":"F\u00e4rber","sequence":"additional","affiliation":[]},{"given":"Sergej","family":"Fries","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Merkle","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Nickel","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Nouak","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Opel","sequence":"additional","affiliation":[]},{"given":"Annahita","family":"Oswald","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Seidl","sequence":"additional","affiliation":[]},{"given":"Bianca","family":"Wackersreuther","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Wackersreuther","sequence":"additional","affiliation":[]},{"given":"Xuebing","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,2,27]]},"reference":[{"key":"47_CR1","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: BioKeyS PilotDB Teil 2 (Projekt Template Protection). Abschlussbericht, in Vorbereitung."},{"issue":"3","key":"47_CR2","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"N. K. Ratha","year":"2001","unstructured":"N.K. Ratha, J.H. Connell und R. Bolle: Enhancing security and privacy of biometric-based authentication systems. IBM Systems Journal, Vol. 40, Issue 3, 2001.","journal-title":"IBM Systems Journal"},{"key":"47_CR3","first-page":"393","volume-title":"Lecture Notes in Computer Science","author":"Jean-Paul Linnartz","year":"2003","unstructured":"J.-P. Linnartz und P. Tuyls: New shielding functions to enhance privacy and prevent misuse of biometric templates. In Proc. Int. Conf. on Audio- and Video-Based Biometric Person Authentication (AVBPA), LNCS 2688, Springer, 2003."},{"key":"47_CR4","doi-asserted-by":"crossref","unstructured":"F. Hao, R. Anderson und J. Daugman. Combining crypto with biometric effectively, IEEE Trans. Comp. 55, 2006.","DOI":"10.1109\/TC.2006.138"},{"key":"47_CR5","unstructured":"U. Korte, M. Krawczak, J. Merkle, R. Plaga, M. Niesing, C. Tiemann, H. Vinck, und U. Martini: A cryptographic biometric authentication system based on genetic fingerprints. In Proc. Sicherheit 2008, LNI 128, GI, 2008."},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"P. Tuyls, A. Akkermans, T. Kevenaar, G.J. Schrijen, A. Bazen, R. Veldhuis: Practical biometric template protection system based on reliable components. In Proc. Audio- and Video-Based Biometric Person Authentication (AVBPA), LNCS 3546, Springer, 2005.","DOI":"10.1007\/11527923_45"},{"key":"47_CR7","unstructured":"ISO\/IEC FDIS 24745 Information technology \u2014 Security techniques \u2014 Biometric information protection, 2010."},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"A. Juels und M. Wattenberg: A fuzzy commitment scheme. In Proc. ACM Conf. Comp. and Comm. Security, 1999.","DOI":"10.1145\/319709.319714"},{"key":"47_CR9","doi-asserted-by":"crossref","unstructured":"Y. Dodis, L. Reyzin, A. Smith: Fuzzy extractors: How to generate strong keys, In Proc. Advances in Cryptology \u2014 EUROCRYPT 2004, LNCS 3027, Springer, 2004.","DOI":"10.1007\/978-3-540-24676-3_31"},{"issue":"4","key":"47_CR10","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","volume":"2","author":"Karthik Nandakumar","year":"2007","unstructured":"K. Nandakumar, A.K. Jain, S. Pankanti: Fingerprint-based fuzzy vault: Implementation and performance. IEEE Trans. Information Forensics and Security, Vol. 2, No 4, 2007.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"47_CR11","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"Adi Shamir","year":"1979","unstructured":"A. Shamir: How to share a secret. Commun. ACM 22, 1979.","journal-title":"Communications of the ACM"},{"key":"47_CR12","doi-asserted-by":"crossref","unstructured":"A. Juels und M. Sudan: A fuzzy vault scheme, In Proc. IEEE Int. Symp. Information Theory, 2002.","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"47_CR13","first-page":"310","volume-title":"Lecture Notes in Computer Science","author":"Umut Uludag","year":"2005","unstructured":"U. Uludag, S. Pankanti und A.K. Jain: Fuzzy vault for fingerprints. Proc. Int. Conf. on Audio- and Video-based Biometric Person Authentication (AVBPA), LNCS 3546, Springer, 2005."},{"key":"47_CR14","doi-asserted-by":"crossref","unstructured":"U. Korte, J. Merkle und M. Niesing: Datenschutzfreundliche Authentisierung mit Fingerabdr\u00fccken, in DuD \u2014 1\/2009.","DOI":"10.1007\/s11623-009-0087-2"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0047-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0047-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0047-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0047-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T21:59:39Z","timestamp":1560031179000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0047-5"}},"subtitle":["Ein Bericht \u00fcber das Projekt BioKeyS"],"short-title":[],"issued":{"date-parts":[[2011,2,27]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["47"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0047-5","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2,27]]}}}