{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T12:25:02Z","timestamp":1768911902094,"version":"3.49.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/saci.2015.7208255","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T21:52:02Z","timestamp":1440107522000},"page":"37-41","source":"Crossref","is-referenced-by-count":3,"title":["An evaluation of the Reed-Solomon error-correcting codes usage for bio-cryptographic algorithms"],"prefix":"10.1109","author":[{"given":"Marius-Alexandru","family":"Velciu","sequence":"first","affiliation":[]},{"given":"Alecsandru","family":"Patrascu","sequence":"additional","affiliation":[]},{"given":"Victor-Valeriu","family":"Patriciu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1109\/CINTI.2014.7028667","article-title":"Methods of reducing bio-cryptographic algorithms computational complexity","author":"velciu","year":"2014","journal-title":"The 15th International Symposium on Computational Intelligence and Informatics (CINTI 2014)"},{"key":"ref10","article-title":"Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security AND Privacy","author":"stoianov","year":"2007"},{"key":"ref6","article-title":"Design and Implementation of Reed-Solomon Decoder using Decomposed Inversion less Berlekamp-Massey Algorithm","author":"elsaid","year":"2010","journal-title":"FACULTY OF ENGINEERING CAIRO UNIVERSITY GIZA EGYPT"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RAECS.2014.6799559"},{"key":"ref8","article-title":"The Berlekamp-Massey Algorithm via Minimal Polynomials","author":"norton","year":"2010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.09.004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/AMS.2010.50"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SACI.2014.6840054"},{"key":"ref1","article-title":"Combining cryptography with biometrics effectively","author":"hao","year":"0","journal-title":"Technical Report Number 640 UCAM-CL-TR-640"}],"event":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics (SACI)","location":"Timisoara, Romania","start":{"date-parts":[[2015,5,21]]},"end":{"date-parts":[[2015,5,23]]}},"container-title":["2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7165000\/7208165\/07208255.pdf?arnumber=7208255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T17:03:26Z","timestamp":1567098206000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7208255\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/saci.2015.7208255","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}