{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T11:32:56Z","timestamp":1768822376548,"version":"3.49.0"},"reference-count":5,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100014188","name":"NRF","doi-asserted-by":"publisher","award":["2020R1A2C2013089"],"award-info":[{"award-number":["2020R1A2C2013089"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010418","name":"IITP","doi-asserted-by":"publisher","award":["2020-0-01389"],"award-info":[{"award-number":["2020-0-01389"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010418","name":"IITP","doi-asserted-by":"publisher","award":["2022-0-01047"],"award-info":[{"award-number":["2022-0-01047"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002635","name":"Inha University Research Grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002635","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3195380","type":"journal-article","created":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:21:30Z","timestamp":1659658890000},"page":"2816-2817","source":"Crossref","is-referenced-by-count":9,"title":["Comments on \u201cPassBio: Privacy-Preserving User-Centric Biometric Authentication\u201d"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1517-6925","authenticated-orcid":false,"given":"Hee-Yong","family":"Kwon","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Inha University, Incheon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4423-7467","authenticated-orcid":false,"given":"Mun-Kyu","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Inha University, Incheon, South Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2838540"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3122823"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2018.5138"},{"key":"ref5","volume-title":"Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59","year":"2019"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09845415.pdf?arnumber=9845415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T09:35:49Z","timestamp":1706780149000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9845415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3195380","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}