{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:07:07Z","timestamp":1760346427237,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/icacci.2014.6968299","type":"proceedings-article","created":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T22:33:17Z","timestamp":1417559597000},"page":"1629-1635","source":"Crossref","is-referenced-by-count":10,"title":["An approach to cryptographic key distribution through fingerprint based key distribution center"],"prefix":"10.1109","author":[{"given":"Subhas","family":"Barman","sequence":"first","affiliation":[]},{"given":"Samiran","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"given":"Debasis","family":"Samanta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"User's Guide to NIST Biometric Image Software (NBIS)","author":"watson","year":"2007","journal-title":"National Institute of Standards and Technology"},{"journal-title":"Fingerprint Verification Competition FVC","year":"2004","key":"ref11"},{"key":"ref12","article-title":"Generation of key for Session key Distribution Using Bio-Metrics","volume":"2","author":"seshadri","year":"2010","journal-title":"International Journal on Computer Science and Engineering"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5120\/1942-2594"},{"journal-title":"Computer Security Principles and Practice","year":"2010","author":"stallings","key":"ref14"},{"journal-title":"Handbook of Fingerprint Recognition","year":"2003","author":"maltoni","key":"ref15"},{"journal-title":"Federal Information Processing Standards Publication 197 United States National Institute of Standards and Technology (NIST)","article-title":"Advance Encryption Standard (AES)","year":"2001","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2007.4426824"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924299"},{"key":"ref6","first-page":"57","article-title":"Efficient Cancellable Biometric Key Generation Scheme for Cryptography","volume":"11","author":"gaddam","year":"2010","journal-title":"International Journal of Network Security"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1049\/iet-cvi.2010.0176","article-title":"Context-based biometric key generation for Iris","volume":"5","author":"christian","year":"2011","journal-title":"IET Computer Vision"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"ref7","first-page":"28","article-title":"Secured Cryptographic Key Generation from Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris","volume":"7","author":"jagadeesan","year":"2010","journal-title":"International Journal of Information and Computer Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"journal-title":"Cryptography and Network Security Principles and Practice 5e","year":"2010","author":"stallings","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.138"}],"event":{"name":"2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2014,9,24]]},"location":"Delhi, India","end":{"date-parts":[[2014,9,27]]}},"container-title":["2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6949764\/6968191\/06968299.pdf?arnumber=6968299","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T01:22:22Z","timestamp":1498180942000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6968299\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icacci.2014.6968299","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}