{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:26:14Z","timestamp":1750242374759,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/csc.2011.6138538","type":"proceedings-article","created":{"date-parts":[[2012,1,31]],"date-time":"2012-01-31T21:47:02Z","timestamp":1328046422000},"page":"302-308","source":"Crossref","is-referenced-by-count":19,"title":["Voiceprint-biometric template design and authentication based on cloud computing security"],"prefix":"10.1109","author":[{"given":"Hua-Hong","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Qian-Hua","family":"He","sequence":"additional","affiliation":[]},{"given":"Hua-Hong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Wei-Hua","family":"Cao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79104-1_5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISECS.2008.100"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76969-9_12"},{"journal-title":"T-REC-X I086-200811-I","article-title":"Telebiometrics protection procedures - Part 1: A guideline to technical and managerial countermeasures for biometric data security","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/BF02831727","article-title":"A method of homomorphic encryption","volume":"11","author":"li","year":"2006","journal-title":"Wuhan University Journal of Natural Sciences"},{"key":"ref17","first-page":"169","article-title":"On data banks and privacy homomorphism","author":"rivest","year":"1978","journal-title":"Foundations of Secure Computation"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2008.49"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1115\/1.859759.paper75"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.08.003"},{"key":"ref3","first-page":"9","article-title":"Talking up voice biometrics","year":"2006","journal-title":"Biometric Technology Today"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2009.03528"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/3-540-45344-X_32","article-title":"An analysis of minutiae matching strength","author":"ratha","year":"2001","journal-title":"Proceedings of Audio and Video-based Biometric Person Authentication"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00080-1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"ref2","first-page":"9","article-title":"Speaker verification: Part 1","author":"paw1ewsk","year":"2006","journal-title":"Biometric Technology Today"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/978-3-642-13869-0_30","article-title":"Token-Based cloud computing: Secure outsourcing of data and arbitrary computations withlower latency","author":"sadeghi","year":"2010","journal-title":"Proc of the 3rd Int'l Conf on Trust and Trustworthy Computing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"}],"event":{"name":"2011 International Conference on Cloud and Service Computing (CSC)","start":{"date-parts":[[2011,12,12]]},"location":"Hong Kong, China","end":{"date-parts":[[2011,12,14]]}},"container-title":["2011 International Conference on Cloud and Service Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6132470\/6138497\/06138538.pdf?arnumber=6138538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T13:37:10Z","timestamp":1497965830000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6138538\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/csc.2011.6138538","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}