{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:22Z","timestamp":1750306042413,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"imec through ICON Diskman"},{"name":"The European Commission FP7 project EKSISTENZ","award":["607049"],"award-info":[{"award-number":["607049"]}]},{"name":"Research Council KU Leuven","award":["C16\/15\/058"],"award-info":[{"award-number":["C16\/15\/058"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3078863","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"21-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication"],"prefix":"10.1145","author":[{"given":"Aysajan","family":"Abidin","sequence":"first","affiliation":[{"name":"imec-COSIC KU Leuven, Leuven, Belgium"}]},{"given":"Enrique","family":"Argones R\u00faa","sequence":"additional","affiliation":[{"name":"imec-COSIC KU Leuven, Leuven, Belgium"}]},{"given":"Roel","family":"Peeters","sequence":"additional","affiliation":[{"name":"imec-COSIC KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"volume-title":"On Privacy-Preserving Biometric Authentication","author":"Abidin Aysajan","key":"e_1_3_2_1_1_1","unstructured":"Aysajan Abidin . 2017. On Privacy-Preserving Biometric Authentication . Springer International Publishing , Cham , 169--186. Aysajan Abidin. 2017. On Privacy-Preserving Biometric Authentication. Springer International Publishing, Cham, 169--186."},{"key":"e_1_3_2_1_2_1","volume-title":"Enrique Argones R\u00f9a, and Aikaterini Mitrokotsa","author":"Abidin Aysajan","year":"2016","unstructured":"Aysajan Abidin , Abdelrahaman Aly , Enrique Argones R\u00f9a, and Aikaterini Mitrokotsa . 2016 . Efficient Verifiable Computation of XOR for Biometric Authentication. Springer International Publishing , Cham, 284--298. Aysajan Abidin, Abdelrahaman Aly, Enrique Argones R\u00f9a, and Aikaterini Mitrokotsa. 2016. Efficient Verifiable Computation of XOR for Biometric Authentication. Springer International Publishing, Cham, 284--298."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12280-9_19"},{"key":"e_1_3_2_1_4_1","volume-title":"Enrique Argones R\u00f9a, and Bart Preneel","author":"Abidin Aysajan","year":"2016","unstructured":"Aysajan Abidin , Enrique Argones R\u00f9a, and Bart Preneel . 2016 . An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties. Springer International Publishing , Cham, 335--349. Aysajan Abidin, Enrique Argones R\u00f9a, and Bart Preneel. 2016. An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties. Springer International Publishing, Cham, 335--349."},{"key":"e_1_3_2_1_5_1","unstructured":"Apple. 2015. KeychainTouchID: Using Touch ID with Keychain and LocalAuthentication. https:\/\/developer.apple.com\/library\/ios\/samplecode\/KeychainTouchID\/Introduction\/Intro.html  Apple. 2015. KeychainTouchID: Using Touch ID with Keychain and LocalAuthentication. https:\/\/developer.apple.com\/library\/ios\/samplecode\/KeychainTouchID\/Introduction\/Intro.html"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2168213"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2014.0031"},{"key":"e_1_3_2_1_8_1","volume-title":"A window to your health. Jacksonville Medicine","author":"Bolling J.","year":"2000","unstructured":"J. Bolling . 2000. A window to your health. Jacksonville Medicine , Special Issue : Retinal Diseases 51 ( 2000 ). J. Bolling. 2000. A window to your health. Jacksonville Medicine, Special Issue: Retinal Diseases 51 (2000)."},{"key":"e_1_3_2_1_9_1","volume-title":"An Authentication Protocol with Encrypted Biometric Data. In AFRICACRYPT '08 (LNCS)","volume":"8813","author":"Bringer Julien","year":"2008","unstructured":"Julien Bringer and Herv\u00e9 Chabanne . 2008 . An Authentication Protocol with Encrypted Biometric Data. In AFRICACRYPT '08 (LNCS) , Vol. 8813 . Springer, 109--124. Julien Bringer and Herv\u00e9 Chabanne. 2008. An Authentication Protocol with Encrypted Biometric Data. In AFRICACRYPT '08 (LNCS), Vol. 8813. Springer, 109--124."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(98)80016-2"},{"key":"e_1_3_2_1_11_1","volume-title":"INTERSPEECH'09","author":"Dehak Najim","year":"2009","unstructured":"Najim Dehak , R\u00e9da Dehak , Patrick Kenny , Niko Br\u00fcmmer , Pierre Ouellet , and Pierre Dumouchel . 2009 . Support vector machines versus fast scoring in the low-dimensional total variability space for speaker verification . In INTERSPEECH'09 . 1559--1562. Najim Dehak, R\u00e9da Dehak, Patrick Kenny, Niko Br\u00fcmmer, Pierre Ouellet, and Pierre Dumouchel. 2009. Support vector machines versus fast scoring in the low-dimensional total variability space for speaker verification. In INTERSPEECH'09. 1559--1562."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2031942"},{"key":"e_1_3_2_1_14_1","volume-title":"International Conference on Biometrics - ICB","author":"Han Hu","year":"2013","unstructured":"Hu Han , Charles Otto , and Anil K. Jain . 2013. Age estimation from face images: Human vs. machine performance . In International Conference on Biometrics - ICB 2013 . IEEE, 1--8. Hu Han, Charles Otto, and Anil K. Jain. 2013. Age estimation from face images: Human vs. machine performance. In International Conference on Biometrics - ICB 2013. IEEE, 1--8."},{"volume-title":"Electrical and Computer Engineering, 2009. CCECE '09. Canadian Conference on. 682--685","author":"Ibrahim M. T.","key":"e_1_3_2_1_15_1","unstructured":"M. T. Ibrahim , M. Kyan , and L. Guan . 2009. On-line signature verification using global features . In Electrical and Computer Engineering, 2009. CCECE '09. Canadian Conference on. 682--685 . M. T. Ibrahim, M. Kyan, and L. Guan. 2009. On-line signature verification using global features. In Electrical and Computer Engineering, 2009. CCECE '09. Canadian Conference on. 682--685."},{"key":"e_1_3_2_1_16_1","unstructured":"ISO\/IEC 24745:2011. 2011. Information technology -- Security techniques -- Biometric information protection. (2011).  ISO\/IEC 24745:2011. 2011. Information technology -- Security techniques -- Biometric information protection. (2011)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2005.24"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMV.2009.18"},{"key":"e_1_3_2_1_21_1","volume-title":"LNCS","volume":"6223","author":"Krawczyk Hugo","year":"2010","unstructured":"Hugo Krawczyk . 2010 . Cryptographic extraction and key derivation: The HKDF scheme. In Advances in Cryptology-CRYPTO 2010 , LNCS , Vol. 6223 , Springer, 631--648. Hugo Krawczyk. 2010. Cryptographic extraction and key derivation: The HKDF scheme. In Advances in Cryptology-CRYPTO 2010, LNCS, Vol. 6223, Springer, 631--648."},{"key":"e_1_3_2_1_22_1","volume-title":"Nature 205 (February","author":"Penrose L. S.","year":"1965","unstructured":"L. S. Penrose . 1965. Dermatoglyphic Topology . Nature 205 (February 1965 ), 544--546. L. S. Penrose. 1965. Dermatoglyphic Topology. Nature 205 (February 1965), 544--546."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.11.025"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319720"},{"key":"e_1_3_2_1_25_1","volume-title":"On the Leakage of Information in Biometric Authentication. In INDOCRYPT 2014 (LNCS)","volume":"8885","author":"Pagnin Elena","year":"2014","unstructured":"Elena Pagnin , Christos Dimitrakakis , Aysajan Abidin , and Aikaterini Mitrokotsa . 2014 . On the Leakage of Information in Biometric Authentication. In INDOCRYPT 2014 (LNCS) , Vol. 8885 . Springer, 265--280. Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin, and Aikaterini Mitrokotsa. 2014. On the Leakage of Information in Biometric Authentication. In INDOCRYPT 2014 (LNCS), Vol. 8885. Springer, 265--280."},{"key":"e_1_3_2_1_26_1","unstructured":"Samsung. 2016. Pass Programming Guide. http:\/\/developer.samsung.com\/resources\/pass  Samsung. 2016. Pass Programming Guide. http:\/\/developer.samsung.com\/resources\/pass"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.24"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. of SPIE 7306","author":"Sutcu Yagiz","year":"2009","unstructured":"Yagiz Sutcu , Qiming Li , and Nasir Memon . 2009 . Design and analysis of fuzzy extractors for faces . Proc. of SPIE 7306 (2009), 73061X-73061X-12. Yagiz Sutcu, Qiming Li, and Nasir Memon. 2009. Design and analysis of fuzzy extractors for faces. Proc. of SPIE 7306 (2009), 73061X-73061X-12."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Shuo Wang and Jing Liu. 2011. Biometrics on mobile phone. In Recent Application on Biometrics. InTech.  Shuo Wang and Jing Liu. 2011. Biometrics on mobile phone. In Recent Application on Biometrics. InTech.","DOI":"10.5772\/17151"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.02.015"},{"key":"e_1_3_2_1_32_1","first-page":"1206","article-title":"A Framework for Token and Biometrics Based Authentication in Computer Systems","volume":"6","author":"Zheng Jian De","year":"2011","unstructured":"Jian De Zheng . 2011 . A Framework for Token and Biometrics Based Authentication in Computer Systems . JCP 6 , 6 (2011), 1206 -- 1212 . Jian De Zheng. 2011. A Framework for Token and Biometrics Based Authentication in Computer Systems. JCP 6, 6 (2011), 1206--1212.","journal-title":"JCP"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1182"}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT'17"},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078863","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078863"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":32,"alternative-id":["10.1145\/3078861.3078863","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3078863","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}