{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:00:59Z","timestamp":1772643659521,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/btas.2010.5634527","type":"proceedings-article","created":{"date-parts":[[2010,11,19]],"date-time":"2010-11-19T21:30:10Z","timestamp":1290202210000},"page":"1-7","source":"Crossref","is-referenced-by-count":62,"title":["A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates"],"prefix":"10.1109","author":[{"given":"Mauro","family":"Barni","sequence":"first","affiliation":[]},{"given":"Tiziano","family":"Bianchi","sequence":"additional","affiliation":[]},{"given":"Dario","family":"Catalano","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Di Raimondo","sequence":"additional","affiliation":[]},{"given":"Ruggero Donida","family":"Labati","sequence":"additional","affiliation":[]},{"given":"Pierluigi","family":"Failla","sequence":"additional","affiliation":[]},{"given":"Dario","family":"Fiore","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Lazzeretti","sequence":"additional","affiliation":[]},{"given":"Vincenzo","family":"Piuri","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Piva","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Scotti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"kolesnikov","year":"2010","journal-title":"Modular design of efficient secure function evaluation protocols"},{"key":"17","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-3-642-03168-7_14","article-title":"Privacy-preserving face recognition","author":"erkin","year":"2009","journal-title":"PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies"},{"key":"18","first-page":"235","article-title":"Efficient privacy-preserving face recognition","volume":"5984","author":"sadeghi","year":"2009","journal-title":"ICISC '09 Proceedings of the 12th Annual International Conference on Information Security and Cryptology"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP.2008.4610727"},{"key":"16","article-title":"Cancellable biometrics and userdependent multi-state discretization in biohash","author":"teoh","year":"0","journal-title":"Pattern Analysis & Applications"},{"key":"13","author":"cimato","year":"2006","journal-title":"Metodo di Generazione e di Verifica di Una Informazione di Sicurezza Ottenuta Mediante Letture Biometriche"},{"key":"14","doi-asserted-by":"crossref","first-page":"867","DOI":"10.1109\/TIFS.2009.2033227","article-title":"Multibiometric cryptosystem: Model structure and performance analysis","volume":"4","author":"fu","year":"2009","journal-title":"Information Forensics and Security IEEE Transactions on"},{"key":"11","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/ISIT.2002.1023680","article-title":"A fuzzy vault scheme","author":"juels","year":"2002","journal-title":"Information Theory 2002 Proceedings 2002 IEEE International Symposium on"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"21","volume":"7667","author":"stoianov","year":"2010","journal-title":"Cryptographically Secure Biometrics"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2002.1037952"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73458-1_8"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68164-9_8"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-984-2_9"},{"key":"25","first-page":"899","article-title":"Efficient biometric verification in encrypted domain","author":"upmanyu","year":"2009","journal-title":"ICB '09 Proceedings of the Third International Conference on Advances in Biometrics"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2043188"},{"key":"27","author":"jain","year":"2003","journal-title":"Handbook of Fingerprint Recognition"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"29","first-page":"10","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","author":"el gamal","year":"1985","journal-title":"Proceedings of CRYPTO 84 on Advances in cryptology"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/83.841531"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.117"},{"key":"10","first-page":"28","author":"juels","year":"1999","journal-title":"A fuzzy commitment scheme"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"30","year":"0","journal-title":"CROSSMATCH Technologies Verifier 300"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.05.001"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"key":"31","year":"0","journal-title":"Neurotechnology Dataset Cross Match Verifier 300"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1854229.1854270"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2009.5386477"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206646"}],"event":{"name":"2010 IEEE Fourth International Conference On Biometrics: Theory, Applications And Systems (BTAS)","location":"Washington, DC, USA","start":{"date-parts":[[2010,9,27]]},"end":{"date-parts":[[2010,9,29]]}},"container-title":["2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5618724\/5634461\/05634527.pdf?arnumber=5634527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T11:33:40Z","timestamp":1559820820000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5634527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/btas.2010.5634527","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}