{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T22:50:21Z","timestamp":1766011821256,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/isit.2009.5205878","type":"proceedings-article","created":{"date-parts":[[2009,8,24]],"date-time":"2009-08-24T15:09:52Z","timestamp":1251126592000},"page":"2251-2255","source":"Crossref","is-referenced-by-count":10,"title":["Secret rate - Privacy leakage in biometric systems"],"prefix":"10.1109","author":[{"given":"Tanya","family":"Ignatenko","sequence":"first","affiliation":[]},{"given":"Frans","family":"Willems","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1055107"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055508"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2007.4313115"},{"article-title":"maintaining secrecy when infoleakage is unavoidable","year":"2004","author":"smith","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055356"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/18.651026"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"7","first-page":"197","article-title":"on the security of the xor-method in biometric authentication systems","author":"ignatenko","year":"2006","journal-title":"Proc of 27th Symp on Inf Theory in the Benelux"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797646"},{"journal-title":"Secure lossless compression with side inf","year":"2008","author":"gu?ndu?z","key":"5"},{"key":"4","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1109\/18.825796","article-title":"cr and secret key generation with a helper","volume":"46","author":"csisza?r","year":"2000","journal-title":"IEEE Trans on Inf Th"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495470"},{"journal-title":"submitted to IEEE Trans on Inf Forensics and Security","article-title":"biometric authentication systems: privacy and security aspects","year":"2008","key":"8"}],"event":{"name":"2009 IEEE International Symposium on Information Theory - ISIT","start":{"date-parts":[[2009,6,28]]},"location":"Seoul, South Korea","end":{"date-parts":[[2009,7,3]]}},"container-title":["2009 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5179947\/5205248\/05205878.pdf?arnumber=5205878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T23:05:33Z","timestamp":1497827133000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5205878\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isit.2009.5205878","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}