{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:54:58Z","timestamp":1729662898853,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856682","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"127-132","source":"Crossref","is-referenced-by-count":2,"title":["Efficient biometric-based Encryption for fingerprints"],"prefix":"10.1109","author":[{"given":"Neyire Deniz","family":"Sarier","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/sec.162"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2489179"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/1315245.1315270","article-title":"Attribute-based encryption with non-monotonic access structures","author":"ostrovsky","year":"2007","journal-title":"ACM CCS'07"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11935230_7"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1109\/TIFS.2015.2392559","article-title":"Security considerations in minutiae-based fuzzy vaults","volume":"10","author":"mih\u00e4ilescu","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/11586821_29"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12368-9_7"},{"key":"ref4","first-page":"457","article-title":"Fuzzy Identity-Based Encryption","volume":"3494","author":"sahai","year":"2005","journal-title":"EURO-CRYPT'O5 ser LNCS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229330"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180419"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"article-title":"Biometric cryptosystems: Authentication, encryption and signature for biometric identities","year":"2013","author":"sarier","key":"ref7"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/319709.319714","article-title":"A fuzzy commitment scheme","author":"juels","year":"1999","journal-title":"ACM CCS'99"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2662372"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2011.12.004"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856682.pdf?arnumber=7856682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T19:53:44Z","timestamp":1568836424000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856682\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856682","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}