{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T13:00:01Z","timestamp":1767963601054,"version":"3.49.0"},"reference-count":25,"publisher":"Oxford University Press (OUP)","issue":"12","license":[{"start":{"date-parts":[[2018,7,27]],"date-time":"2018-07-27T00:00:00Z","timestamp":1532649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672346"],"award-info":[{"award-number":["61672346"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12,1]]},"DOI":"10.1093\/comjnl\/bxy072","type":"journal-article","created":{"date-parts":[[2018,6,15]],"date-time":"2018-06-15T07:07:13Z","timestamp":1529046433000},"page":"1794-1805","source":"Crossref","is-referenced-by-count":6,"title":["Computational Robust Fuzzy Extractor"],"prefix":"10.1093","volume":"61","author":[{"given":"Yunhua","family":"Wen","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"},{"name":"State Key Laboratory of Cryptology, Beijing, China"}]},{"given":"Shengli","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"},{"name":"State Key Laboratory of Cryptology, Beijing, China"},{"name":"Westone Cryptologic Research Center, Beijing, China"}]},{"given":"Ziyuan","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Shuai","family":"Han","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"},{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]}],"member":"286","published-online":{"date-parts":[[2018,7,27]]},"reference":[{"key":"key\n\t\t\t\t2018112402024392900_bxy072C1","doi-asserted-by":"crossref","first-page":"1915","DOI":"10.1109\/18.476316","article-title":"Generalized privacy amplification","volume":"41","author":"Bennett","year":"1995","journal-title":"IEEE Trans. Inf. Theory"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C2","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1006\/jcss.1996.0004","article-title":"Randomness is linear in space","volume":"52","author":"Nisan","year":"1996","journal-title":"J. Comput. Syst. Sci."},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C3","author":"Barak","year":"2011"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C4","author":"Dodis","year":"2014"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C5","author":"Boyen","year":"2005"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C6","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1145\/954339.954342","article-title":"Face recognition: A literature survey","volume":"5","author":"Zhao","year":"2003","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C7","doi-asserted-by":"crossref","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","article-title":"Biometric cryptosystems: issues and challenges","volume":"92","author":"Uludag","year":"2004","journal-title":"Proc. IEEE"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C8","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1109\/TSMCB.2007.903540","article-title":"New methods in iris recognition","volume":"37","author":"Daugman","year":"2007","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C9","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s102070100006","article-title":"Password hardening based on keystroke dynamics","volume":"1","author":"Monrose","year":"2002","journal-title":"Int. J. Inf. Secur."},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C10","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","article-title":"Keystroke dynamics as a biometric for authentication","volume":"16","author":"Monrose","year":"2000","journal-title":"Future Generation Comput. Syst."},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C11","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1038\/35005001","article-title":"Quantum information and computation","volume":"404","author":"Bennett","year":"2000","journal-title":"Nature"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C12","first-page":"435","article-title":"Multiparty quantum signature schemes","volume":"16","author":"Arrazola","year":"2016","journal-title":"Quantum Inf. Comput."},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C13","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","article-title":"Physical Unclonable Functions and Applications: A Tutorial","volume":"102","author":"Herder","year":"2014","journal-title":"Proc. IEEE"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C14","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.1109\/TIFS.2016.2524666","article-title":"Design, Evaluation, and Optimization of Physical Unclonable Functions Based on Transient Effect Ring Oscillators","volume":"11","author":"Cherkaoui","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C15","author":"Dodis","year":"2004"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C16","doi-asserted-by":"crossref","first-page":"6207","DOI":"10.1109\/TIT.2012.2200290","article-title":"Robust fuzzy extractors and authenticated key agreement from close secrets","volume":"58","author":"Dodis","year":"2012","journal-title":"IEEE Trans. Inf. Theory"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C17","author":"Boyen","year":"2004"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C18","author":"Kanukurth","year":"2008"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C19","author":"Cramer","year":"2008"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C20","author":"Fuller","year":"2013"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C21","author":"Sutcu","year":"2013"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C22","author":"Yamamura","year":"2001"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C23","author":"Nieto","year":"2001"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C24","author":"Krawczyk","year":"1998"},{"key":"key\n\t\t\t\t2018112402024392900_bxy072C25","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","volume":"38","author":"Dodis","year":"2008","journal-title":"SIAM J. Comput."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/12\/1794\/26724957\/bxy072.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T09:55:32Z","timestamp":1571478932000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/12\/1794\/5060317"}},"subtitle":[],"editor":[{"given":"Joseph","family":"Liu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,7,27]]},"references-count":25,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2018,7,27]]},"published-print":{"date-parts":[[2018,12,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy072","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,12]]},"published":{"date-parts":[[2018,7,27]]}}}