{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:14:45Z","timestamp":1777371285011,"version":"3.51.4"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/btas.2010.5634545","type":"proceedings-article","created":{"date-parts":[[2010,11,19]],"date-time":"2010-11-19T21:30:10Z","timestamp":1290202210000},"page":"1-7","source":"Crossref","is-referenced-by-count":19,"title":["Generating and sharing biometrics based session keys for secure cryptographic applications"],"prefix":"10.1109","author":[{"given":"Sanjay","family":"Kanade","sequence":"first","affiliation":[]},{"given":"Dijana","family":"Petrovska-Delacretaz","sequence":"additional","affiliation":[]},{"given":"Bernadette","family":"Dorizzi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"buhan","year":"2008","journal-title":"Cryptographic Keys from Noisy Data"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79104-1_5"},{"key":"18","article-title":"The Transport Layer Security (TLS) protocol version 1.2","author":"dierks","year":"2008","journal-title":"Request for Comments 5246"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2007.47"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73458-1_8"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/BSYM.2008.4655523"},{"key":"14","article-title":"Secure remote authentication using biometric data","author":"boyen","year":"2005","journal-title":"Eurocrypt"},{"key":"11","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","author":"dodis","year":"2004","journal-title":"Proc Eurocrypt 2004"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"},{"key":"21","article-title":"Bipartite biotokens: Definitions, implementation, and analysis","author":"scheirer","year":"2009","journal-title":"International Conference on Biometrics (ICB)"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/BSYM.2008.4655516"},{"key":"22","year":"2005","journal-title":"Face Recognition Grand Challenge"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/12.210173"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-004-0144-7"},{"key":"25","author":"kovesi","year":"2005","journal-title":"MATLAB and octave functions for computer vision and image processing"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-984-2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.05.030"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"10","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/ISIT.2002.1023680","article-title":"A fuzzy vault scheme","author":"juels","year":"2002","journal-title":"Proc IEEE Int Symp Information Theory"},{"key":"1","year":"2001","journal-title":"Advanced Encryption Standard (AES)"},{"key":"7","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/319709.319720","article-title":"Password hardening based on keystroke dynamics","author":"monrose","year":"1999","journal-title":"Proceedings of the Sixth ACM Conference on Computer and communication Security (CCCS)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674831"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206646"},{"key":"4","first-page":"1","article-title":"Revocable fingerprint biotokens: Accuracy and security analysis","author":"boult","year":"2007","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2025858"}],"event":{"name":"2010 IEEE Fourth International Conference On Biometrics: Theory, Applications And Systems (BTAS)","location":"Washington, DC, USA","start":{"date-parts":[[2010,9,27]]},"end":{"date-parts":[[2010,9,29]]}},"container-title":["2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5618724\/5634461\/05634545.pdf?arnumber=5634545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T16:20:37Z","timestamp":1497889237000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5634545\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/btas.2010.5634545","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}