{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:11:59Z","timestamp":1725538319704},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040900"},{"type":"electronic","value":"9783642040917"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04091-7_20","type":"book-chapter","created":{"date-parts":[[2009,9,26]],"date-time":"2009-09-26T05:52:07Z","timestamp":1253944327000},"page":"163-170","source":"Crossref","is-referenced-by-count":10,"title":["Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates"],"prefix":"10.1007","author":[{"given":"F. Hern\u00e1ndez","family":"\u00c1lvarez","sequence":"first","affiliation":[]},{"given":"L. Hern\u00e1ndez","family":"Encinas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Diez Laiz, E.: Master Thesis, Universidad Polit\u00e9cnica de Madrid (to appear)"},{"issue":"1","key":"20_CR2","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y. Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM Journal Computing\u00a038(1), 97\u2013139 (2008)","journal-title":"SIAM Journal Computing"},{"key":"20_CR3","unstructured":"Hern\u00e1ndez \u00c1lvarez, F., Hern\u00e1ndez Encinas, L., S\u00e1nchez \u00c1vila, C.: Biometric Fuzzy Extractor Scheme for Iris Templates. In: Proc. of The 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing, WORLDCOMP 2009 (to appear, 2009)"},{"issue":"2","key":"20_CR4","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A. Juels","year":"2006","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. Designs, Codes and Cryptography\u00a038(2), 237\u2013257 (2006)","journal-title":"Designs, Codes and Cryptography"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proc. of the 6th ACM conference on Computer and Communications Security, pp. 28\u201336 (1999)","DOI":"10.1145\/319709.319714"},{"issue":"2","key":"20_CR6","first-page":"17","volume":"8","author":"A.K. Jain","year":"2008","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. Journal on Advances in Signal Processing\u00a08(2), 17 (2008)","journal-title":"Journal on Advances in Signal Processing"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1007\/978-3-540-74549-5_84","volume-title":"Advances in Biometrics","author":"Y.-J. Lee","year":"2007","unstructured":"Lee, Y.-J., Bae, K., Lee, S.-J., Park, K.R., Kim, J.H.: Biometric key binding: Fuzzy vault based on iris images. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol.\u00a04642, pp. 800\u2013808. Springer, Heidelberg (2007)"},{"volume-title":"Handbook of Applied Cryptography","year":"1997","author":"A. Menezes","key":"20_CR8","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1007\/978-3-540-74549-5_64","volume-title":"Advances in Biometrics","author":"V.V.T. Tong","year":"2007","unstructured":"Tong, V.V.T., Sibert, H., Lec\u0153ur, J., Girault, M.: Biometric fuzzy extractors made practical: A proposal based on fingerCodes. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol.\u00a04642, pp. 604\u2013613. Springer, Heidelberg (2007)"},{"issue":"6","key":"20_CR10","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U. Uludag","year":"2004","unstructured":"Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. Proc. of the IEEE\u00a092(6), 948\u2013960 (2004)","journal-title":"Proc. of the IEEE"}],"container-title":["Advances in Intelligent and Soft Computing","Computational Intelligence in Security for Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04091-7_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T10:56:48Z","timestamp":1619780208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04091-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040900","9783642040917"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04091-7_20","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2009]]}}}