{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:06:08Z","timestamp":1773511568819,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196530","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"673-684","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Pseudoentropic Isometries"],"prefix":"10.1145","author":[{"given":"Quentin","family":"Alam\u00e9lou","sequence":"first","affiliation":[{"name":"equensWorldline, Seclin, France"}]},{"given":"Paul-Edmond","family":"Berthier","sequence":"additional","affiliation":[{"name":"equensWorldline, Seclin, France"}]},{"given":"Chlo\u00e9","family":"Cachet","sequence":"additional","affiliation":[{"name":"equensWorldline, Seclin, France"}]},{"given":"St\u00e9phane","family":"Cauchie","sequence":"additional","affiliation":[{"name":"equensWorldline, Seclin, France"}]},{"given":"Benjamin","family":"Fuller","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT, USA"}]},{"given":"Philippe","family":"Gaborit","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Limoges, Limoges, France"}]},{"given":"Sailesh","family":"Simhadri","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Host-based card emulation. https:\/\/developer.android.com\/guide\/topics\/connectivity\/nfc\/hce.html.  Host-based card emulation. https:\/\/developer.android.com\/guide\/topics\/connectivity\/nfc\/hce.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Most common first names and last names in the u.s. https:\/\/names.mongabay.com\/male_names.htm.  Most common first names and last names in the u.s. https:\/\/names.mongabay.com\/male_names.htm."},{"key":"e_1_3_2_1_3_1","unstructured":"Multi-factor authentication. https:\/\/www.pcisecuritystandards.org\/pdfs\/Multi-Factor-Authentication-Guidance-v1.pdf.  Multi-factor authentication. https:\/\/www.pcisecuritystandards.org\/pdfs\/Multi-Factor-Authentication-Guidance-v1.pdf."},{"key":"e_1_3_2_1_4_1","unstructured":"Python implementation of our set difference based RPI. Available at https:\/\/github.com\/benjaminfuller\/CompFE\/blob\/master\/RPISetDifference.py.  Python implementation of our set difference based RPI. Available at https:\/\/github.com\/benjaminfuller\/CompFE\/blob\/master\/RPISetDifference.py."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808138.2808146"},{"key":"e_1_3_2_1_8_1","volume-title":"SEPA Rulebooks Scheme Manuals Remote Domain 46D0\u00ad Mobile App Security Guidelines","year":"2016","unstructured":"Bancontact. SEPA Rulebooks Scheme Manuals Remote Domain 46D0\u00ad Mobile App Security Guidelines , 2016 . Bancontact. SEPA Rulebooks Scheme Manuals Remote Domain 46D0\u00ad Mobile App Security Guidelines, 2016."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217014"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881412.1881448"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2272786"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29615-4_4"},{"key":"e_1_3_2_1_13_1","volume-title":"Mobile device identification via sensor fingerprinting. CoRR, abs\/1408.1416","author":"Bojinov H.","year":"2014","unstructured":"H. Bojinov , Y. Michalevsky , G. Nakibly , and D. Boneh . Mobile device identification via sensor fingerprinting. CoRR, abs\/1408.1416 , 2014 . H. Bojinov, Y. Michalevsky, G. Nakibly, and D. Boneh. Mobile device identification via sensor fingerprinting. CoRR, abs\/1408.1416, 2014."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030096"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/646762.706172"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788414.1788442"},{"key":"e_1_3_2_1_17_1","first-page":"117","volume-title":"Advances in Cryptology -- EUROCRYPT","author":"Canetti R.","year":"2016","unstructured":"R. Canetti , B. Fuller , O. Paneth , L. Reyzin , and A. Smith . Advances in Cryptology -- EUROCRYPT 2016 , chapter Reusable Fuzzy Extractors for Low-Entropy Distributions, pages 117 -- 146 . Springer Berlin Heidelberg , Berlin, Heidelberg, 2016. R. Canetti, B. Fuller, O. Paneth, L. Reyzin, and A. Smith. Advances in Cryptology -- EUROCRYPT 2016, chapter Reusable Fuzzy Extractors for Low-Entropy Distributions, pages 117--146. Springer Berlin Heidelberg, Berlin, Heidelberg, 2016."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11799-2_4"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916285"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660325"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"e_1_3_2_1_24_1","first-page":"1","volume-title":"10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings","author":"Eckersley P.","year":"2010","unstructured":"P. Eckersley . How unique is your web browser? In Privacy Enhancing Technologies , 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings , pages 1 -- 18 , 2010 . P. Eckersley. How unique is your web browser? In Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings, pages 1--18, 2010."},{"key":"e_1_3_2_1_25_1","volume-title":"Security related network functions","author":"ETSI.","year":"1992","unstructured":"ETSI. Digital cellular telecommunications system (phase 2. Security related network functions , 1992 . ETSI. Digital cellular telecommunications system (phase 2. Security related network functions, 1992."},{"key":"e_1_3_2_1_26_1","unstructured":"European Parliament. General Data Protection Regulation (GDPR). http:\/\/ec.europa.eu\/justice\/data-protection\/reform\/files\/regulation_oj_en.pdf 2016.  European Parliament. General Data Protection Regulation (GDPR). http:\/\/ec.europa.eu\/justice\/data-protection\/reform\/files\/regulation_oj_en.pdf 2016."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42033-7_10"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2013.06.003"},{"key":"e_1_3_2_1_29_1","unstructured":"Gemalto. Gemalto eSE secure end-to-end solutions. https:\/\/www.gemalto.com\/iot\/consumer-electronics\/embedded-secure-element.  Gemalto. Gemalto eSE secure end-to-end solutions. https:\/\/www.gemalto.com\/iot\/consumer-electronics\/embedded-secure-element."},{"key":"e_1_3_2_1_30_1","unstructured":"GlobalPlatform. GlobalPlatform made simple guide: Trusted Execution Environment (TEE) Guide. https:\/\/www.globalplatform.org\/mediaguidetee.asp.  GlobalPlatform. GlobalPlatform made simple guide: Trusted Execution Environment (TEE) Guide. https:\/\/www.globalplatform.org\/mediaguidetee.asp."},{"key":"e_1_3_2_1_31_1","unstructured":"Google. Android Developer Reference Settings.Secure ANDROID_ID. https:\/\/developer.android.com\/reference\/android\/provider\/Settings.Secure.html#ANDROID_ID.  Google. Android Developer Reference Settings.Secure ANDROID_ID. https:\/\/developer.android.com\/reference\/android\/provider\/Settings.Secure.html#ANDROID_ID."},{"key":"e_1_3_2_1_32_1","volume-title":"Android Security 2016 Year in Review. https:\/\/source.android.com\/security\/reports\/Google_Android_Security_2016_Report_Final.pdf","year":"2017","unstructured":"Google. Android Security 2016 Year in Review. https:\/\/source.android.com\/security\/reports\/Google_Android_Security_2016_Report_Final.pdf , 2017 . Google. Android Security 2016 Year in Review. https:\/\/source.android.com\/security\/reports\/Google_Android_Security_2016_Report_Final.pdf, 2017."},{"key":"e_1_3_2_1_33_1","volume-title":"An implementation of syndrome encoding and decoding for binary bch codes, secure sketches and fuzzy extractors","author":"Harmon K.","year":"2006","unstructured":"K. Harmon , S. Johnson , and L. Reyzin . An implementation of syndrome encoding and decoding for binary bch codes, secure sketches and fuzzy extractors , 2006 . Available at http:\/\/www.cs.bu.edu\/ reyzin\/code\/fuzzy.html. K. Harmon, S. Johnson, and L. Reyzin. An implementation of syndrome encoding and decoding for binary bch codes, secure sketches and fuzzy extractors, 2006. Available at http:\/\/www.cs.bu.edu\/ reyzin\/code\/fuzzy.html."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"e_1_3_2_1_35_1","volume-title":"Public key cryptosystems with noisy secret keys. IACR Cryptology ePrint Archive","author":"Herder C.","year":"2017","unstructured":"C. Herder , B. Fuller , M. van Dijk , and S. Devadas . Public key cryptosystems with noisy secret keys. IACR Cryptology ePrint Archive , 2017 :210, 2017. C. Herder, B. Fuller, M. van Dijk, and S. Devadas. Public key cryptosystems with noisy secret keys. IACR Cryptology ePrint Archive, 2017:210, 2017."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2536609"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_10"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0027"},{"key":"e_1_3_2_1_42_1","first-page":"199","volume-title":"Tenth Symposium on Usable Privacy and Security, SOUPS 2014","author":"Lin J.","year":"2014","unstructured":"J. Lin , B. Liu , N. M. Sadeh , and J. I. Hong . Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings . In Tenth Symposium on Usable Privacy and Security, SOUPS 2014 , Menlo Park, CA, USA , July 9-11, 2014 , pages 199 -- 212 , 2014. J. Lin, B. Liu, N. M. Sadeh, and J. I. Hong. Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings. In Tenth Symposium on Usable Privacy and Security, SOUPS 2014, Menlo Park, CA, USA, July 9-11, 2014, pages 199--212, 2014."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873602"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_2"},{"key":"e_1_3_2_1_45_1","volume-title":"MasterCard CloudBased Payments Security Guidelines for MPA Development Version 1.1","year":"2015","unstructured":"MasterCard. MasterCard CloudBased Payments Security Guidelines for MPA Development Version 1.1 , 2015 . MasterCard. MasterCard CloudBased Payments Security Guidelines for MPA Development Version 1.1, 2015."},{"key":"e_1_3_2_1_46_1","unstructured":"Morpho. Secure Elements. https:\/\/www.morpho.com\/en\/commercial-identity\/solutions-telecom\/secure-elements.  Morpho. Secure Elements. https:\/\/www.morpho.com\/en\/commercial-identity\/solutions-telecom\/secure-elements."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of W2SP 2012","author":"Mowery K.","year":"2012","unstructured":"K. Mowery and H. Shacham . Pixel perfect: Fingerprinting canvas in HTML5. In M. Fredrikson, editor , Proceedings of W2SP 2012 . IEEE Computer Society , May 2012 . K. Mowery and H. Shacham. Pixel perfect: Fingerprinting canvas in HTML5. In M. Fredrikson, editor, Proceedings of W2SP 2012. IEEE Computer Society, May 2012."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39235-1_9"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1996.0004"},{"key":"e_1_3_2_1_51_1","unstructured":"NIST. Digital identity guidelines: Authentication and lifecycle management. http:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800--63b.pdf.  NIST. Digital identity guidelines: Authentication and lifecycle management. http:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800--63b.pdf."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.24"},{"key":"e_1_3_2_1_55_1","unstructured":"E. Telecommunications Standards Institute. SIM. http:\/\/www.etsi.org\/technologies-clusters\/technologies\/smart-cards\/sim.  E. Telecommunications Standards Institute. SIM. http:\/\/www.etsi.org\/technologies-clusters\/technologies\/smart-cards\/sim."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"e_1_3_2_1_57_1","volume-title":"Visa Digital Solutions. Version 1.0","author":"Security Requirements VISA.","year":"2014","unstructured":"VISA. Security Requirements and Evaluation Guidance for Mobile Applications . Visa Digital Solutions. Version 1.0 , 2014 . VISA. Security Requirements and Evaluation Guidance for Mobile Applications. Visa Digital Solutions. Version 1.0, 2014."},{"key":"e_1_3_2_1_58_1","first-page":"1","volume-title":"Codes and Cryptography","author":"Wen Y.","year":"2018","unstructured":"Y. Wen , S. Liu , and S. Han . Reusable fuzzy extractor from the decisional diffie--hellman assumption. Designs , Codes and Cryptography , pages 1 -- 18 , 2018 . Y. Wen, S. Liu, and S. Han. Reusable fuzzy extractor from the decisional diffie--hellman assumption. Designs, Codes and Cryptography, pages 1--18, 2018."},{"key":"e_1_3_2_1_59_1","unstructured":"Wikipedia. International Mobile Equipment Identity (IMEI). https:\/\/en.wikipedia.org\/wiki\/International_Mobile_Equipment_Identity.  Wikipedia. International Mobile Equipment Identity (IMEI). https:\/\/en.wikipedia.org\/wiki\/International_Mobile_Equipment_Identity."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660300"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196530","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196530"}},"subtitle":["A New Framework for Fuzzy Extractor Reusability"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":59,"alternative-id":["10.1145\/3196494.3196530","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196530","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}