{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:53Z","timestamp":1750221113513,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T00:00:00Z","timestamp":1552435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"TUBITAK","award":["114E557"],"award-info":[{"award-number":["114E557"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,13]]},"DOI":"10.1145\/3292006.3300037","type":"proceedings-article","created":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T12:22:04Z","timestamp":1553170924000},"page":"351-362","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SKA-CaNPT"],"prefix":"10.1145","author":[{"given":"Laleh","family":"Eskandarian","sequence":"first","affiliation":[{"name":"Sabanci University, Istanbul, Turkey"}]},{"given":"Dilara","family":"Akdo\u011fan","sequence":"additional","affiliation":[{"name":"Sabanci University, Istanbul, Turkey"}]},{"given":"Duygu","family":"Karao\u011flan Altop","sequence":"additional","affiliation":[{"name":"Sabanci University, Istanbul, Turkey"}]},{"given":"Albert","family":"Levi","sequence":"additional","affiliation":[{"name":"Sabanci University, Istanbul, Turkey"}]}],"member":"320","published-online":{"date-parts":[[2019,3,13]]},"reference":[{"volume-title":"d.}. Cross Match Verifier 300 LC","key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. Cross Match Verifier 300 LC . http:\/\/www.crossmatch.com\/verifier-300-lc\/. ({n. d.}). Accessed: 2015-05-01. {n. d.}. Cross Match Verifier 300 LC. http:\/\/www.crossmatch.com\/verifier-300-lc\/. ({n. d.}). Accessed: 2015-05-01."},{"volume-title":"d.}. Neurotechnology Verifinger Sample DB","key":"e_1_3_2_1_2_1","unstructured":"{n. d.}. Neurotechnology Verifinger Sample DB . http:\/\/www.neurotechnology.com\/. ({n. d.}). Accessed: 2015-05-01. {n. d.}. Neurotechnology Verifinger Sample DB. http:\/\/www.neurotechnology.com\/. ({n. d.}). Accessed: 2015-05-01."},{"volume-title":"IEEE Conference on Communications and Network Security.","author":"Akdogan D.","key":"e_1_3_2_1_3_1","unstructured":"D. Akdogan , D. K. Altop , and A. Levi . 2015. Secure Key Agreement using Pure Biometrics . In IEEE Conference on Communications and Network Security. D. Akdogan, D. K.Altop, and A. Levi. 2015. Secure Key Agreement using Pure Biometrics. In IEEE Conference on Communications and Network Security."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"R. Bolle J. Connell S. Pankanti N. Ratha and W. Andrew. 2003. Senior Guide to Biometrics. (2003).   R. Bolle J. Connell S. Pankanti N. Ratha and W. Andrew. 2003. Senior Guide to Biometrics. (2003).","DOI":"10.1007\/978-1-4757-4036-3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"S. Chikkerur N.K. Ratha H. Connell and R.M. Bolle. 2008. Generating Registration-Free Cancellable Fingerprint Templates. In BTAS08 2008 (2008).  S. Chikkerur N.K. Ratha H. Connell and R.M. Bolle. 2008. Generating Registration-Free Cancellable Fingerprint Templates. In BTAS08 2008 (2008).","DOI":"10.1109\/BTAS.2008.4699375"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/982507.982516"},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"Cancellable fuzzy vault with periodic transformation for biometric template protection","volume":"2016","author":"Dang T.K.","year":"2016","unstructured":"T.K. Dang , Q.C. Truong , T.T.B. Le1, and H. Truong . 2016 . Cancellable fuzzy vault with periodic transformation for biometric template protection . IET Biometrics 2016 (2016), 1 -- 7 . T.K. Dang, Q.C. Truong, T.T.B. Le1, and H. Truong. 2016. Cancellable fuzzy vault with periodic transformation for biometric template protection. IET Biometrics 2016 (2016), 1--7.","journal-title":"IET Biometrics"},{"key":"e_1_3_2_1_8_1","volume-title":"Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Technical Report. Technical Report 235, Cryptology ePrint Archive.","author":"Dodis Y.","year":"2006","unstructured":"Y. Dodis , R. Ostrovsky , L. Reyzin , and A. Smith . February 2006 . Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Technical Report. Technical Report 235, Cryptology ePrint Archive. Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. February 2006. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Technical Report. Technical Report 235, Cryptology ePrint Archive."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of Computer Vision and Pattern Recognition, Minneapolis 2007","author":"Farooq F.","year":"2007","unstructured":"F. Farooq , R.M. Bolle , T.Y. Jea , and N. Ratha . 2007. Anonymous and Revocable Fingerprint Recognition . In Proceedings of Computer Vision and Pattern Recognition, Minneapolis 2007 ( 2007 ). F. Farooq, R.M. Bolle, T.Y. Jea, and N. Ratha. 2007. Anonymous and Revocable Fingerprint Recognition. In Proceedings of Computer Vision and Pattern Recognition, Minneapolis 2007 (2007)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.01.013"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"key":"e_1_3_2_1_12_1","unstructured":"F. Hao R. Anderson and J. Daugman. 2005. Combining cryptography with biometrics effectively. Technical Report. University of Cambridge.  F. Hao R. Anderson and J. Daugman. 2005. Combining cryptography with biometrics effectively. Technical Report. University of Cambridge."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"A.T.B. Jin D.N.C. Ling and A. Goh. 2004. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern recognition 37 11 (2004) 2245--2255.   A.T.B. Jin D.N.C. Ling and A. Goh. 2004. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern recognition 37 11 (2004) 2245--2255.","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of Second International Conference on Biometrics 38","author":"Lee Y.J.","year":"2007","unstructured":"Y.J. Lee , K. Bae , S.J. Lee , K.R. Park , and J. Kim . 2007. Biometric Key Binding: Fuzzy Vault based on Iris Images . In Proceedings of Second International Conference on Biometrics 38 ( 2007 ), 800--808. Y.J. Lee, K. Bae, S.J. Lee, K.R. Park, and J. Kim. 2007. Biometric Key Binding: Fuzzy Vault based on Iris Images. In Proceedings of Second International Conference on Biometrics 38 (2007), 800--808."},{"key":"e_1_3_2_1_18_1","volume-title":"The fuzzy vault for fingerprints is vulnerable to brute force attack. Computing Research Repository 2007","author":"Mihailescu P.","year":"2007","unstructured":"P. Mihailescu . 2007. The fuzzy vault for fingerprints is vulnerable to brute force attack. Computing Research Repository 2007 ( 2007 ). P. Mihailescu. 2007. The fuzzy vault for fingerprints is vulnerable to brute force attack. Computing Research Repository 2007 (2007)."},{"key":"e_1_3_2_1_20_1","unstructured":"National Institute of Standards and Technology. 2002. FIPS PUB 180--2: Secure Hash Standard. pub-NIST.  National Institute of Standards and Technology. 2002. FIPS PUB 180--2: Secure Hash Standard. pub-NIST."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCSCT.2008.226"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(01)00247-3"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1137\/0215017"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1137\/0221053"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430534"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"S.W. Shin M.-K. Lee D. Moon and K. Moon. 2009. Dictionary attack on functional transform-based cancelable fingerprint templates. ETRI journal 31 5 (2009).  S.W. Shin M.-K. Lee D. Moon and K. Moon. 2009. Dictionary attack on functional transform-based cancelable fingerprint templates. ETRI journal 31 5 (2009).","DOI":"10.4218\/etrij.09.0209.0137"},{"key":"e_1_3_2_1_29_1","volume-title":"uliato and C. Gebotys","author":"M.","year":"2011","unstructured":"M. uliato and C. Gebotys . 2011 . FPGA implementation of an HMAC processor based on the SHA-2 family of hash functions. Technical Report. University of Waterloo M. uliato and C. Gebotys. 2011. FPGA implementation of an HMAC processor based on the SHA-2 family of hash functions. Technical Report. University of Waterloo"}],"event":{"name":"CODASPY '19: Ninth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Richardson Texas USA","acronym":"CODASPY '19"},"container-title":["Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292006.3300037","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292006.3300037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:02Z","timestamp":1750208522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292006.3300037"}},"subtitle":["Secure Key Agreement using Cancelable and Noninvertible Biometrics based on Periodic Transformation"],"short-title":[],"issued":{"date-parts":[[2019,3,13]]},"references-count":28,"alternative-id":["10.1145\/3292006.3300037","10.1145\/3292006"],"URL":"https:\/\/doi.org\/10.1145\/3292006.3300037","relation":{},"subject":[],"published":{"date-parts":[[2019,3,13]]},"assertion":[{"value":"2019-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}