{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:10:36Z","timestamp":1729660236697,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/acpr.2011.6166527","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T11:45:50Z","timestamp":1410349550000},"page":"72-76","source":"Crossref","is-referenced-by-count":0,"title":["Probability of a unique crypto key generation based on finger's different images with two scanners"],"prefix":"10.1109","author":[{"family":"Guoqiang Ma","sequence":"first","affiliation":[]},{"family":"Juan Liu","sequence":"additional","affiliation":[]},{"family":"Bin Ni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2005.1530509"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2002.1044628"},{"key":"18","doi-asserted-by":"crossref","first-page":"2203","DOI":"10.1109\/ICME.2004.1394707","article-title":"Biometrics-based cryptographic key generation","volume":"3","author":"chang","year":"2004","journal-title":"Proc IEEE Int Conf Multimedia and Expo (ICME 2004)"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924299"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1108\/09685220210436949"},{"key":"13","first-page":"353","article-title":"Fuzzy extractors for continuous distributions","author":"buhan","year":"0","journal-title":"Proceedings of the Second ACM Symposium on Information Computer and Communications Security (ASIACCS) Singapore ACM 2007"},{"key":"14","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/319709.319720","article-title":"Password hardening based on keystroke dynamics","author":"monrose","year":"1999","journal-title":"Proceedings of the Sixth ACM Conference on Computer and Communications Security Singapore"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902022"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383385"},{"journal-title":"Handbook of Fingerprint Recognition","year":"2003","author":"maltoni","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2010.09.008"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2009.04.005"},{"key":"23","article-title":"Biometric template security: Challenges and solutions","author":"jain","year":"2005","journal-title":"Proc European Signal Processing Conf (EUSIPCO)"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"year":"0","key":"26"},{"year":"0","key":"27"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.02.003"},{"key":"2","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/TC.2006.138","article-title":"Combining crypto with biometrics effectively","volume":"55","author":"hao","year":"2006","journal-title":"IEEE Trans Comp"},{"key":"10","first-page":"99","article-title":"Secure sketch for biometric templates","author":"li","year":"2006","journal-title":"Advances in Cryptology ? ASIACRYPT?98"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0090-5"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2005.24"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"4","first-page":"93","article-title":"A Brief Summary of Encryption Technology of Biometric","volume":"3","author":"tian","year":"2008","journal-title":"China AUTO-ID"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"8","first-page":"750","article-title":"Robust extraction of secret bits from minutiae","author":"chang","year":"0","journal-title":"Proceedings of the Second International Conference on Biometrics ICB 2007"}],"event":{"name":"2011 First Asian Conference on Pattern Recognition (ACPR 2011)","start":{"date-parts":[[2011,11,28]]},"location":"Beijing","end":{"date-parts":[[2011,11,28]]}},"container-title":["The First Asian Conference on Pattern Recognition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6158722\/6166526\/06166527.pdf?arnumber=6166527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T16:12:58Z","timestamp":1498147978000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6166527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/acpr.2011.6166527","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}