{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:54:42Z","timestamp":1742388882836,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,26]]},"DOI":"10.1145\/1161366.1161377","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"page":"56-61","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Robust, short and sensitive authentication tags using secure sketch"],"prefix":"10.1145","author":[{"given":"Qiming","family":"Li","sequence":"first","affiliation":[{"name":"Polytechnic University"}]},{"given":"Ee-Chien","family":"Chang","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]}],"member":"320","published-online":{"date-parts":[[2006,9,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_5"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/982507.982516"},{"key":"e_1_3_2_1_4_1","first-page":"217","volume-title":"CTA Communications and Networks","author":"Crescenzo G. Di","year":"2003","unstructured":"G. Di Crescenzo , R. Graveman , G. Arce , and R. Ge . A formal security analysis of approximate message authentication codes . In CTA Communications and Networks , pages 217 -- 221 , College Park , MD , April 2003 . G. Di Crescenzo, R. Graveman, G. Arce, and R. Ge. A formal security analysis of approximate message authentication codes. In CTA Communications and Networks, pages 217--221, College Park, MD, April 2003."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"e_1_3_2_1_6_1","series-title":"LNCS","first-page":"13","volume-title":"IFIP Communications and Multimedia Security","author":"Goh A.","year":"2003","unstructured":"A. Goh and D.C.L. Ngo . Computation of cryptographic keys from face biometrics . In IFIP Communications and Multimedia Security , volume 2828 of LNCS , pages 1{ 13 , Torino , Italy, October 2003 . A. Goh and D.C.L. Ngo. Computation of cryptographic keys from face biometrics. In IFIP Communications and Multimedia Security, volume 2828 of LNCS, pages 1{13, Torino, Italy, October 2003."},{"key":"e_1_3_2_1_7_1","volume-title":"3rd Annual Fedlab Symposium of Advanced Telecommunication\/Inforamtion Distribution","volume":"1","author":"Graveman R.","year":"1999","unstructured":"R. Graveman and K. Fu . Approximate message authentication codes . In 3rd Annual Fedlab Symposium of Advanced Telecommunication\/Inforamtion Distribution , volume 1 , College Park, MD , February 1999 . R. Graveman and K. Fu. Approximate message authentication codes. In 3rd Annual Fedlab Symposium of Advanced Telecommunication\/Inforamtion Distribution, volume 1, College Park, MD, February 1999."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220210436949"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1762222.1762276"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884447"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073170.1073191"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25976-3_15"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/6046.923823"},{"key":"e_1_3_2_1_17_1","first-page":"609","volume-title":"IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)","author":"Yang Shenglin","year":"2005","unstructured":"Shenglin Yang and Ingrid Verbauwhede . Automatic secure fingerprint verification system based on fuzzy vault scheme . In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) , pages 609 -- 612 , March 2005 . Shenglin Yang and Ingrid Verbauwhede. Automatic secure fingerprint verification system based on fuzzy vault scheme. In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pages 609--612, March 2005."}],"event":{"name":"MM&Sec '06: Multimedia and Security Workshop","sponsor":["ACM Association for Computing Machinery","SIGMM ACM Special Interest Group on Multimedia"],"location":"Geneva Switzerland","acronym":"MM&Sec '06"},"container-title":["Proceedings of the 8th workshop on Multimedia and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1161366.1161377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T02:34:58Z","timestamp":1673058898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1161366.1161377"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,26]]},"references-count":16,"alternative-id":["10.1145\/1161366.1161377","10.1145\/1161366"],"URL":"https:\/\/doi.org\/10.1145\/1161366.1161377","relation":{},"subject":[],"published":{"date-parts":[[2006,9,26]]},"assertion":[{"value":"2006-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}