{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T18:35:27Z","timestamp":1768070127172,"version":"3.49.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/infcom.2013.6567073","type":"proceedings-article","created":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T16:12:57Z","timestamp":1375373577000},"page":"2652-2660","source":"Crossref","is-referenced-by-count":76,"title":["Efficient privacy-preserving biometric identification in cloud computing"],"prefix":"10.1109","author":[{"given":"Jiawei","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Shucheng","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"397","article-title":"Fingerprint verification using spectral minutiae representations","volume":"4","author":"xu","year":"2009","journal-title":"Trans Info For Sec"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00103-0"},{"key":"16","first-page":"795","article-title":"A hybrid fingerprint matcher","volume":"3","author":"ross","year":"2002","journal-title":"Pattern Recognition 2002 Proceedings 16th International Conference on"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017618"},{"key":"14","first-page":"190","article-title":"Secure and efficient protocols for iris and fingerprint identification","author":"blanton","year":"2011","journal-title":"Proceedings of the 16th European Conference on Research in Computer Security Ser ESORICS'11"},{"key":"11","first-page":"297","article-title":"An attacker's view of distance preserving maps for privacy preserving data mining","author":"liu","year":"2006","journal-title":"Proceedings of the 10th European Conference on Principle and Practice of Knowledge Discovery in Databases Ser PKDD'06"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/83.841531"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.39"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1854229.1854270"},{"key":"1","author":"bolle","year":"1998","journal-title":"Biometrics Personal Identification in Networked Society Personal Identification in Networked Society"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-87126-9","author":"delfs","year":"2002","journal-title":"Introduction to Cryptography - Principles and Applications"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"6","first-page":"123","article-title":"Over-encryption: Management of access control evolution on outsourced data","author":"di vimercati","year":"2007","journal-title":"Proceedings of the 33rd International Conference on Very Large Data Bases Ser VLDB '07"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"4","article-title":"Efficient privacy-preserving biometric identification","author":"huang","year":"2011","journal-title":"NDSS"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.55"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.84"}],"event":{"name":"IEEE INFOCOM 2013 - IEEE Conference on Computer Communications","location":"Turin, Italy","start":{"date-parts":[[2013,4,14]]},"end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6556116\/6566708\/06567073.pdf?arnumber=6567073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T13:14:31Z","timestamp":1498050871000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6567073\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/infcom.2013.6567073","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}