{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:16:05Z","timestamp":1769915765681,"version":"3.49.0"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001659","name":"German Research Foundation (DFG) through the Project HoliPUF","doi-asserted-by":"publisher","award":["KR3517\/6-1"],"award-info":[{"award-number":["KR3517\/6-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005156","name":"Alexander von Humboldt Professorship endowed by the German Federal Ministry of Education and Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005156","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/tifs.2018.2834303","type":"journal-article","created":{"date-parts":[[2018,5,7]],"date-time":"2018-05-07T18:25:29Z","timestamp":1525717529000},"page":"2872-2883","source":"Crossref","is-referenced-by-count":38,"title":["Privacy, Secrecy, and Storage With Multiple Noisy Measurements of Identifiers"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0313-7788","authenticated-orcid":false,"given":"Onur","family":"Gunlu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3904-9181","authenticated-orcid":false,"given":"Gerhard","family":"Kramer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"ref33","first-page":"13","article-title":"On the connection between the entropies of input and output distributions of discrete memoryless channels","author":"ahlswede","year":"1974","journal-title":"Proc Conf Probabil Theory"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1974.1055285"},{"key":"ref31","author":"kramer","year":"2017","journal-title":"Lecture Notes in Information Theory"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.840883"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2487448"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139030687"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/319709.319714","article-title":"A fuzzy commitment scheme","author":"juels","year":"1999","journal-title":"Proc ACM Conf Comput Commun Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/ietele\/e89-c.3.342"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2098872"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/18.825796"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513689"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921889"},{"key":"ref17","author":"berger","year":"1971","journal-title":"Rate Distortion Theory A Mathematical Basis for Data Compression"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2609401"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2208579"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/18.915643"},{"key":"ref4","article-title":"FPGA intrinsic PUFs and their use for IP protection","author":"guajardo","year":"2007","journal-title":"Cryptographic Hardware and Embedded Systems&#x2014;CHES"},{"key":"ref27","first-page":"1980","author":"massey","year":"1998","journal-title":"Applied Digital Information Theory"},{"key":"ref3","first-page":"8198","article-title":"DCT based ring oscillator physical unclonable functions","author":"g\u00fcnl\u00fc","year":"2014","journal-title":"Proc IEEE Int Conf Acoust Speech Sign Process"},{"key":"ref6","article-title":"Physical random functions","author":"gassend","year":"2003"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/18.42224"},{"key":"ref5","author":"b\u00f6hm","year":"2012","journal-title":"Physical Unclonable Functions in Theory and Practice"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033228"},{"key":"ref7","article-title":"Physical one-way functions","author":"pappu","year":"2001"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1049\/cp:19950462","article-title":"the handwritten signature as a biometric identifier: psychophysical model and system design","author":"plamondon","year":"1995","journal-title":"European Convention on Security and Detection (Conf Publ No 408)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5225058"},{"key":"ref1","first-page":"89","article-title":"Privacy and secrecy with multiple measurements of physical and biometric identifiers","author":"g\u00fcnl\u00fc","year":"2015","journal-title":"Proc IEEE Conf Commun Netw Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2323246"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2210215"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2173629"},{"key":"ref24","first-page":"1","article-title":"Reliable secret key generation from physical unclonable functions under varying environmental conditions","author":"g\u00fcnl\u00fc","year":"2015","journal-title":"Proc IEEE Int Workshop Inf Forensics Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2145510"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1055107"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1007\/b138151","author":"wayman","year":"2005","journal-title":"Biometric Systems Technology Design and Performance Evaluation"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8361165\/08355814.pdf?arnumber=8355814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T13:38:58Z","timestamp":1693661938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8355814\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":38,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2018.2834303","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11]]}}}