{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T13:57:52Z","timestamp":1709647072383},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2014,5,1]],"date-time":"2014-05-01T00:00:00Z","timestamp":1398902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/tifs.2014.2312851","type":"journal-article","created":{"date-parts":[[2014,4,15]],"date-time":"2014-04-15T18:04:52Z","timestamp":1397585092000},"page":"875-884","source":"Crossref","is-referenced-by-count":11,"title":["The Spammed Code Offset Method"],"prefix":"10.1109","volume":"9","author":[{"given":"Boris","family":"Skoric","sequence":"first","affiliation":[]},{"given":"Niels","family":"de Vreede","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2009.5386479"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1016\/j.ic.2011.06.001","article-title":"Sharp lower bounds on the extractable randomness from non-uniform sources","volume":"209","author":"\u0161kori?","year":"2011","journal-title":"Inf Computat"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2046965"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1007\/978-3-642-32946-3_27","article-title":"Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs","volume":"7397","author":"van herrewege","year":"0","journal-title":"Financial Cryptography and Data Security"},{"key":"ref10","author":"de groot","year":"2012","journal-title":"Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"ref12","first-page":"523","article-title":"Fuzzy Extractors: How to generate strong keys from biometrics and other noisy data","volume":"3027","author":"dodis","year":"2004","journal-title":"Eurocrypt"},{"key":"ref13","first-page":"4273","article-title":"The conditional R&#x00E9;nyi entropy","volume":"58","author":"fehr","year":"2013","journal-title":"IEEE Trans Inf Theory"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-69457-1","author":"franceschini","year":"2009","journal-title":"Ldpc Coded Modulations"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","author":"gallager","year":"1963","journal-title":"Low-Density Parity Check Codes"},{"key":"ref16","author":"gassend","year":"2003","journal-title":"Physical random functions"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"ref19","first-page":"28","article-title":"A fuzzy commitment scheme","author":"juels","year":"0","journal-title":"Proc ACM CCS"},{"key":"ref28","first-page":"369","article-title":"Read-proof hardware from protective coatings","volume":"4249","author":"tuyls","year":"0","journal-title":"Proc CHES"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/BF01388651"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2093698.2093722"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5040-5"},{"key":"ref29","author":"tuyls","year":"2007","journal-title":"Security with Noisy Data Private Biometrics Secure Key Storage and Anti-Counterfeiting"},{"key":"ref5","author":"barral","year":"2010","journal-title":"Biometrics & security Combining fingerprints smart cards and cryptography"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"ref7","first-page":"147","article-title":"Secure remote authentication using biometric data","volume":"3494","author":"boyen","year":"0","journal-title":"Proc EUROCRYPT"},{"key":"ref2","year":"2014","journal-title":"Super-Fast Pseudo-Random Number Generator (PRNG) Implementation Using SSE\/SSE4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_27"},{"key":"ref1","year":"2014","journal-title":"Gjrand Random Numbers"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.195"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41395-7"},{"key":"ref21","author":"mackay","year":"2013","journal-title":"Gallager code resources"},{"key":"ref24","first-page":"199","article-title":"Simple and tight bounds for information reconciliation and privacy amplification","volume":"3788","author":"renner","year":"0","journal-title":"Proc ASIACRYPT"},{"key":"ref23","first-page":"233","article-title":"Smooth R&#x00E9;nyi entropy and applications","author":"renner","year":"0","journal-title":"Proc IEEE ISIT"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14452-3","author":"sadeghi","year":"2010","journal-title":"Towards Hardware-Intrinsic Security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511791338"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6776454\/06798816.pdf?arnumber=6798816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:29:48Z","timestamp":1642004988000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6798816\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":33,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2312851","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5]]}}}