{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T04:13:52Z","timestamp":1741752832421,"version":"3.38.0"},"reference-count":23,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["MGS"],"published-print":{"date-parts":[[2018,9,25]]},"DOI":"10.3233\/mgs-180293","type":"journal-article","created":{"date-parts":[[2018,9,29]],"date-time":"2018-09-29T11:25:06Z","timestamp":1538220306000},"page":"307-320","source":"Crossref","is-referenced-by-count":1,"title":["New biometric cryptosystem to protect sensitive data in Internet of objects"],"prefix":"10.1177","volume":"14","author":[{"given":"Abdelkader","family":"Belhadri","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Benyettou","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"key":"10.3233\/MGS-180293_ref2","first-page":"311","article-title":"A novel secure architecture for the internet of things","author":"Chen","year":"2011","journal-title":"Proc IEEE Int Conf Genetic and Evolutionary Computing"},{"key":"10.3233\/MGS-180293_ref3","first-page":"45","article-title":"Secure smartcardbased fingerprint authentication","author":"Clancy","year":"2003","journal-title":"Proc ACM Workshop Biometrics methods and applications"},{"key":"10.3233\/MGS-180293_ref4","first-page":"648","article-title":"On enabling secure applications through off-line biometric identification","author":"Davida","year":"1998","journal-title":"Proc IEEE Symp Security and Privacy"},{"issue":"1","key":"10.3233\/MGS-180293_ref5","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","volume":"38","author":"Dodis","year":"2008","journal-title":"SIAM Journal on Computing"},{"issue":"7","key":"10.3233\/MGS-180293_ref6","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of things (IoT): A vision, architectural elements, and future directions","volume":"29","author":"Gubbi","year":"2013","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"10.3233\/MGS-180293_ref7","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","article-title":"A fuzzy vault scheme","volume":"38","author":"Juels","year":"2006","journal-title":"Designs, Codes and Cryptography"},{"key":"10.3233\/MGS-180293_ref8","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/319709.319714","article-title":"A fuzzy commitment scheme","author":"Juels","year":"1999","journal-title":"Proc ACM Conf Computer and communication Security"},{"issue":"3","key":"10.3233\/MGS-180293_ref9","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1109\/JIOT.2014.2323395","article-title":"Securing the internet of things: A standardization perspective","volume":"1","author":"Keoh","year":"2014","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/MGS-180293_ref10","unstructured":"T. Kl\u00f8ve and V. Korzhik, Error Detecting Codes: General Theory and Their Application in Feedback Communication Systems, Volume 335, Springer Science and Business Media, 2012."},{"key":"10.3233\/MGS-180293_ref11","first-page":"811","article-title":"Fvc2002: Second fingerprint verification competition","author":"Maio","year":"2002","journal-title":"Proc IEEE Int Conf Pattern Recognition"},{"key":"10.3233\/MGS-180293_ref12","doi-asserted-by":"crossref","unstructured":"D. Maltoni, D. Maio, A. Jain and S. Prabhakar, Handbook of Fingerprint Recognition, Springer Science and Business Media, 2009.","DOI":"10.1007\/978-1-84882-254-2"},{"key":"10.3233\/MGS-180293_ref13","unstructured":"F.P. Miller, A.F. Vandome and J. McBrewster, Advanced Encryption Standard, Alpha Press, 2009."},{"key":"10.3233\/MGS-180293_ref14","doi-asserted-by":"crossref","unstructured":"R.H. Morelos-Zaragoza, The Art of Error Correcting Coding, John Wiley and Sons, 2006.","DOI":"10.1002\/0470035706"},{"key":"10.3233\/MGS-180293_ref15","first-page":"1","article-title":"Securing fingerprint template: Fuzzy vault with minutiae descriptors","author":"Nagar","year":"2008","journal-title":"Proc IEEE Int Conf Pattern Recognition"},{"issue":"4","key":"10.3233\/MGS-180293_ref16","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","article-title":"Fingerprint-based fuzzy vault: Implementation and performance","volume":"2","author":"Nandakumar","year":"2007","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.3233\/MGS-180293_ref17","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1117\/12.304705","article-title":"Biometric encryption using image processing","author":"Soutar","year":"1998","journal-title":"Optical Security and Counterfeit Deterrence Techniques II, Proc SPIE"},{"key":"10.3233\/MGS-180293_ref18","first-page":"648","article-title":"Security in the internet of things: A review","author":"Suo","year":"2012","journal-title":"Proc IEEE Int Conf Computer Science and Electronics Engineering"},{"issue":"9","key":"10.3233\/MGS-180293_ref19","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/S1361-3723(15)30084-1","article-title":"The security issues of the internet of things","volume":"2015","author":"Tankard","year":"2015","journal-title":"Computer Fraud and Security"},{"issue":"6","key":"10.3233\/MGS-180293_ref20","first-page":"430","article-title":"Integrating robots into the internet of things","volume":"6","author":"Turcu","year":"2012","journal-title":"International Journal of Circuits, Systems and Signal Processing"},{"key":"10.3233\/MGS-180293_ref21","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/11527923_32","article-title":"Fuzzy vault for fingerprints","author":"Uludag","year":"2005","journal-title":"Proc Springer Int Conf Audio-and Video-Based Biometric Person Authentication"},{"issue":"6","key":"10.3233\/MGS-180293_ref22","doi-asserted-by":"crossref","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","article-title":"Biometric cryptosystems: Issues and challenges","volume":"92","author":"Uludag","year":"2004","journal-title":"Proceedings of the IEEE"},{"issue":"1","key":"10.3233\/MGS-180293_ref23","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","article-title":"Internet of things\u00a0\u2013 new security and privacy challenges","volume":"26","author":"Weber","year":"2010","journal-title":"Computer Law and Security Review"},{"key":"10.3233\/MGS-180293_ref24","first-page":"609","article-title":"Automatic secure fingerprint verification system based on fuzzy vault scheme","author":"Yang","year":"2005","journal-title":"Proc IEEE Int Conf Acoustics, Speech and Signal"}],"container-title":["Multiagent and Grid Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/MGS-180293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T04:10:24Z","timestamp":1741666224000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospress&doi=10.3233\/MGS-180293"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,25]]},"references-count":23,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/mgs-180293","relation":{},"ISSN":["1875-9076","1574-1702"],"issn-type":[{"type":"electronic","value":"1875-9076"},{"type":"print","value":"1574-1702"}],"subject":[],"published":{"date-parts":[[2018,9,25]]}}}