{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T08:16:01Z","timestamp":1768810561654,"version":"3.49.0"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"The University of Birmingham EPSRC","award":["EP\/H005501\/1"],"award-info":[{"award-number":["EP\/H005501\/1"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Fundation of China","doi-asserted-by":"crossref","award":["61202475"],"award-info":[{"award-number":["61202475"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/tifs.2014.2362979","type":"journal-article","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T18:30:42Z","timestamp":1413311442000},"page":"2302-2313","source":"Crossref","is-referenced-by-count":77,"title":["An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation"],"prefix":"10.1109","volume":"9","author":[{"given":"Jiangshan","family":"Yu","sequence":"first","affiliation":[]},{"given":"Guilin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Gao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISBAST.2008.4547645"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.04.016"},{"key":"ref33","first-page":"1","article-title":"Securing fingerprint template: Fuzzy vault with minutiae descriptors","author":"nagar","year":"2008","journal-title":"Proc 19th Int Conf Pattern Recognit"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.031"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2010.5583388"},{"key":"ref30","first-page":"523","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","author":"dodis","year":"2004","journal-title":"Advances in Cryptology"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.185"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/982507.982516"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)01118-5"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.922056"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00709-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.03.017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11537878_31"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00110-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_28"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/958965.958969"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/991130.991137"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"ref19","author":"jain","year":"2003","journal-title":"Handbook of Fingerprint Recognition"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"13","DOI":"10.5121\/ijnsa.2011.3202","article-title":"Cryptanalysis and further improvement of a biometric-based remote user authentication scheme using smart cards","volume":"3","author":"das","year":"2011","journal-title":"Int J Netw Security Appl"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.09.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2215877"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.206"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1049\/ip-e.1991.0022","article-title":"remote password authentication with smart cards","volume":"138","author":"chang","year":"1991","journal-title":"Computers and Digital Techniques IEE Proceedings-"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-013-9997-5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203221"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.228"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(99)80136-9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1616"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179540"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.09.006"},{"key":"ref22","first-page":"129","article-title":"Non-interactive and information-theoretic secure verifiable secret sharing","author":"pedersen","year":"1991","journal-title":"Advances in Cryptology"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"529","DOI":"10.3233\/JCS-2007-15503","article-title":"Privacy preserving multi-factor authentication with biometrics","volume":"15","author":"bhargav-spantzel","year":"2007","journal-title":"J Comput Security"},{"key":"ref42","first-page":"232","article-title":"Entity authentication and key distribution","author":"bellare","year":"1993","journal-title":"Advances in Cryptology"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr028"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2008.04.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2031942"},{"key":"ref44","first-page":"139","article-title":"Authenticated key exchange secure against dictionary attacks","author":"bellare","year":"2000","journal-title":"Advances in Cryptology"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.08.001"},{"key":"ref43","first-page":"453","article-title":"Analysis of key-exchange protocols and their use for building secure channels","author":"canetti","year":"2001","journal-title":"Advances in Cryptology"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2235831"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6953163\/06923423.pdf?arnumber=6923423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:00:38Z","timestamp":1642003238000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6923423"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":47,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2362979","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12]]}}}