{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T13:30:55Z","timestamp":1763904655482,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/cvprw.2008.4563113","type":"proceedings-article","created":{"date-parts":[[2008,7,17]],"date-time":"2008-07-17T23:40:22Z","timestamp":1216338022000},"page":"1-6","source":"Crossref","is-referenced-by-count":28,"title":["Fuzzy extractors for asymmetric biometric representations"],"prefix":"10.1109","author":[{"family":"Qiming Li","sequence":"first","affiliation":[]},{"family":"Muchuan Guo","sequence":"additional","affiliation":[]},{"family":"Ee-Chien Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924299"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"15","article-title":"secure sketch for biometric templates","author":"li","year":"2006","journal-title":"ASIACRYPT"},{"key":"16","first-page":"393","article-title":"new shielding functions to enhance privacy and prevent misuse of biometric templates","author":"linnartz","year":"2003","journal-title":"AVBPA 2003"},{"key":"13","first-page":"566","article-title":"3d face: biometric template protection for 3d face recognition","volume":"4642","author":"kelkboom","year":"2007","journal-title":"LNCS"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1117\/12.766861","article-title":"realization of correlation attack against fuzzy vault scheme","author":"kholmatov","year":"2008","journal-title":"Security Forensics Steganography and Watermarking of Multimedia Contents X volume 6819 of Proceedings of SPIE"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1109\/ISIT.2002.1023680","article-title":"a fuzzy vault scheme","author":"juels","year":"2002","journal-title":"IEEE Int Symp on Information Theory"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430534"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902022"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"key":"24","article-title":"biometric fuzzy extractors made practical: a proposal based on fingercodes","author":"tong","year":"2007","journal-title":"International Conference on Biometrics"},{"key":"25","first-page":"436","article-title":"practical biometric authentication with template protection","author":"tuyls","year":"2005","journal-title":"AVBPA"},{"key":"26","first-page":"158","article-title":"capacity and examples of template-protecting biometric authentication systems","author":"tuyls","year":"2004","journal-title":"ECCV Workshop BioAW"},{"key":"27","first-page":"609","article-title":"automatic secure fingerprint verification system based on fuzzy vault scheme","author":"yang","year":"2005","journal-title":"IEEE Proc IEEE Int Conf Acoustics Speech Signal Processing (ICASSP)"},{"key":"3","article-title":"secure remote authentication using biometric data","author":"boyen","year":"2005","journal-title":"Eurocrypt"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030096"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"},{"key":"1","article-title":"fuzzy extractors for minutiae-based fingerprint authentication","author":"arakala","year":"2007","journal-title":"International Conference on Biometrics"},{"key":"7","article-title":"secure smartcard-based fingerprint authentication","author":"clancy","year":"2003","journal-title":"ACM Workshop on Biometric Methods and Applications"},{"key":"6","article-title":"robust extraction of secrets bits from minutiae","author":"chang","year":"2007","journal-title":"International Conference on Biometrics"},{"key":"5","first-page":"59","article-title":"hiding secret points amidst chaff","volume":"4004","author":"chang","year":"2006","journal-title":"LNCS"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_94"},{"article-title":"combining cryptography with biometrics effectively","year":"2005","author":"hao","key":"9"},{"key":"8","first-page":"523","article-title":"fuzzy extractors: how to generate strong keys from biometrics and other noisy data","volume":"3027","author":"dodis","year":"2004","journal-title":"LNCS"}],"event":{"name":"2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPR Workshops)","start":{"date-parts":[[2008,6,23]]},"location":"Anchorage, AK, USA","end":{"date-parts":[[2008,6,28]]}},"container-title":["2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4558053\/4562948\/04563113.pdf?arnumber=4563113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T09:59:37Z","timestamp":1497779977000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4563113\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cvprw.2008.4563113","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}