{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:27:53Z","timestamp":1775838473440,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/ictas.2018.8368743","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T22:06:47Z","timestamp":1527804407000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Encryption using finger-code generated from fingerprints"],"prefix":"10.1109","author":[{"given":"Cynthia Sthembile","family":"Ntshangase","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Meshack Bafana","family":"Shabalala","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i22\/95288"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5120\/21865-5194"},{"key":"ref12","first-page":"48","article-title":"RSA Key Generation Using Combination of Fingerprints","volume":"15","author":"singh","year":"2012","journal-title":"IOSR Journal of Computer Engineering"},{"key":"ref13","first-page":"1598","volume":"2","author":"rao","year":"2012","journal-title":"Finger Print Parameter Based Cryptographic Key Generation"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"66","DOI":"10.25195\/ijci.v41i1.101","article-title":"RSA Cryptographic Key Generation Using Fingerprint Minutiae","volume":"1","author":"rashid","year":"2014","journal-title":"Iraqi Comm Comput Informatics Iraqi J Comput Informatics"},{"key":"ref4","first-page":"257","article-title":"Crowdsourcing Attacks on Biometric Systems","author":"panjwani","year":"2014","journal-title":"SOUPS'14 Proc Tenth Symp Usable Priv Secur"},{"key":"ref3","first-page":"1","article-title":"Smart Cards and their Operating Systems","author":"guo","year":"2002","journal-title":"Helsinki Univ Technol Softw Multimed Lab Tech Rep"},{"key":"ref6","first-page":"1","article-title":"A novel secure key-exchange protocol using biometrics of the sender and receiver","volume":"0","author":"barman","year":"2016","journal-title":"Comput Electr Eng"},{"key":"ref5","first-page":"622","article-title":"Attacks on biometric systems: a case study in fingerprints","author":"uludag","year":"2004","journal-title":"Proc SPIE 5306 Secur Steganography Watermarking Multimed Contents"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2015.03.024"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"31","DOI":"10.5120\/ijca2015907662","article-title":"A NewCryptosystem based on Fingerprint Features","volume":"132","author":"ismaeel","year":"2015","journal-title":"Internatinal Journal of Computer Application"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.38"},{"key":"ref1","author":"barral","year":"2010","journal-title":"Biometrics & security Combining fingerprints smart cards and cryptography"},{"key":"ref9","first-page":"594","volume":"4","author":"zeyadismaeel","year":"2015","journal-title":"Data Encryption Algorithm using Asymmetric Key Derived from Fingerprint Biometric Features"}],"event":{"name":"2018 Conference on Information Communications Technology and Society (ICTAS)","location":"Durban","start":{"date-parts":[[2018,3,8]]},"end":{"date-parts":[[2018,3,9]]}},"container-title":["2018 Conference on Information Communications Technology and Society (ICTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8363089\/8368727\/08368743.pdf?arnumber=8368743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T06:28:27Z","timestamp":1643178507000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8368743\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ictas.2018.8368743","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}