{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T11:40:27Z","timestamp":1665229227707},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T00:00:00Z","timestamp":1576195200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T00:00:00Z","timestamp":1576195200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11623-019-1218-z","type":"journal-article","created":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T09:21:57Z","timestamp":1576228917000},"page":"32-37","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Gew\u00e4hrleistung langfristiger Sicherheit f\u00fcr Breeder-Dokumente durch Biometrie und Blockchain-Technologie"],"prefix":"10.1007","volume":"44","author":[{"given":"Marian","family":"Margraf","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Buchmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,13]]},"reference":[{"key":"1218_CR1","unstructured":"C. Busch, B. Yang, U. Seidel, O. Henniger, M. Butt, C. Rathgeb, J. Hermans, G. Schumacher, J. Loeschner, E. Springmann, U. Rabeler, und A. Wolf, \u201cFIDELITY project \u2013 Trustworthy lifecycle management for public documents, White Paper, http:\/\/www.fidelity-project.eu\/media\/download_pictures\/WP_FIDELITY_EC_1.0-RC.pdf ,\u201d 2015."},{"key":"1218_CR2","unstructured":"ORIGINS consortium, \u201cORIGINS project, http:\/\/www.origins-project.eu,\u201d 2017."},{"key":"1218_CR3","unstructured":"European Committee for Standardization, CEN Workshop 84 on a \u2019Self-Sovereign Identifier(s) for Personal Data Ownership and Usage Control\u2019 (CEN WS ISAEN), Std., 2016."},{"key":"1218_CR4","unstructured":"European Committee for Standardization, CEN\/TC 224\/WG19 \u2013 Personal identification and related personal devices with secure element, systems, operations and privacy in a multi sectorial environment \u2013 Breeder Documents, Std., 2017."},{"key":"1218_CR5","unstructured":"S. Nakamoto, \u201cBitcoin: A peer-to-peer electronic cash system, http:\/\/bitcoin.org\/bitcoin.pdf,\u201d 2008."},{"key":"1218_CR6","unstructured":"A. Narayanan, J. Bonneau, E. Felten, A. Miller, und S. Goldfeder, Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton, NJ, USA: Princeton University Press, 2016."},{"key":"1218_CR7","unstructured":"CoinMarketCap, \u201cCryptocurrency market capitalizations https:\/\/coinmarketcap.com\/,\u201d Sept. 2019."},{"issue":"1","key":"1218_CR8","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"AK Jain","year":"2004","unstructured":"A. K. Jain, A. Ross, und S. Prabhakar, \u201cAn introduction to biometric recognition,\u201d IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4\u201320, 2004.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"1218_CR9","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/ACCESS.2013.2262916","volume":"1","author":"SP Fenker","year":"2013","unstructured":"S. P. Fenker, E. Ortiz, und K. W. Bowyer, \u201cTemplate aging phenomenon in iris recognition,\u201d IEEE Access, vol. 1, pp. 266\u2013274, 2013.","journal-title":"IEEE Access"},{"issue":"28","key":"1218_CR10","doi-asserted-by":"publisher","first-page":"8555","DOI":"10.1073\/pnas.1410272112","volume":"112","author":"S Yoon","year":"2015","unstructured":"S. Yoon und A. K. Jain, \u201cLongitudinal study of fingerprint recognition,\u201d Proceedings of the National Academy of Sciences, vol. 112, no. 28, pp. 8555\u20138560, 2015.","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"1218_CR11","doi-asserted-by":"crossref","unstructured":"P. Grother, J. R. Matey, E. Tabassi, G. Quinn, und M. Chumakov, \u201cIREX VI: temporal stability of iris recognition accuracy,\u201d NIST, Tech. Rep., interagency Report 7948, 2013.","DOI":"10.6028\/NIST.IR.7948"},{"key":"1218_CR12","doi-asserted-by":"crossref","unstructured":"Y. Koda, T. Higuchi, und A. K. Jain, \u201cAdvances in capturing child fingerprints: A high resolution cmos image sensor with sldr method,\u201d in Int\u2019l Conf. of the Biometrics Special Interest Group (BIOSIG), 2016, pp. 1\u20134.","DOI":"10.1109\/BIOSIG.2016.7736909"},{"key":"1218_CR13","unstructured":"ISO\/IEC IS 19794:2011. Information Technology \u2013 Biometric Data Interchange Format \u2013 Part 4: Finger image data, Part 6: Iris image data, Int\u2019l Organization for Standardization and Int\u2019l Electrotechnical Committee, 2011."},{"key":"1218_CR14","unstructured":"ICAO, Doc 9303 \u2013 Machine Readable Travel Documents \u2013 Part 9: Deployment of Biometric Identification and Electronic Storage of Data in eMRTDs, 7th ed., International Civil Aviation Organization (ICAO), 2015."},{"key":"1218_CR15","doi-asserted-by":"crossref","unstructured":"W. Funk, M. Arnold, C. Busch, und A. Munde, \u201cEvaluation of image compression algorithms for fingerprint and face recognition systems,\u201d in 6th Systems, Man Cybernetics Information Assurance Workshop (SMC-IAW\u201906), 2005, pp. 72\u201378","DOI":"10.1109\/IAW.2005.1495936"},{"key":"1218_CR16","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/TIFS.2007.916009","volume":"3","author":"J Daugman","year":"2008","unstructured":"J. Daugman und C. Downing, \u201cEffect of severe image compression on iris recognition performance,\u201d IEEE Trans. Inf. Forensics and Sec., vol. 3, pp. 52\u201361, 2008.","journal-title":"IEEE Trans. Inf. Forensics and Sec."},{"key":"1218_CR17","unstructured":"FVC-onGoing: on-line evaluation of fingerprint recognition algorithms, \u201cFingerprint verification Competition \u2013 2002,\u201d retrieved March, 2017. [Online]. Available: http:\/\/bias.csr.unibo.it\/fvc2002\/"},{"key":"1218_CR18","unstructured":"Indian Institute of Technology Delhi, \u201cIIT Delhi Iris Database,\u201d retrieved March, 2017. [Online]. Available: http:\/\/www4.comp.polyu.edu.hk\/~csajaykr\/IITD\/Database_Iris.htm"},{"key":"1218_CR19","doi-asserted-by":"crossref","unstructured":"N. Buchmann, C. Rathgeb, J. Wagner, C. Busch, und H. Baier, \u201cA preliminary study on the feasibility of storing fingerprint and iris image data in 2d-barcodes,\u201d in Int\u2019l Conf. of the Biometrics Special Interest Group (BIOSIG), 2016.","DOI":"10.1109\/BIOSIG.2016.7736904"},{"key":"1218_CR20","unstructured":"Federal Information Processing Standards Publication (FIPS PUB), FIPS PUB 186-4: Digital Signature Standard (DSS), 2013."},{"key":"1218_CR21","unstructured":"NIST: National Institute of Standards and Technology, Recommended elliptic curves for federal government use, 1999."},{"key":"1218_CR22","unstructured":"P. W. Shor, \u201cAlgorithms for quantum computation: Discrete logarithms and factoring,\u201d in Proceedings of the 35th Annual Symposium on Foundations of Computer Science, ser. SFCS \u201994. Washington, DC, USA: IEEE Computer Society, 1994, pp. 124\u2013134"},{"key":"1218_CR23","first-page":"117","volume-title":"H\u00fclsing, XMSS \u2013 A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions","author":"J Buchmann","year":"2011","unstructured":"J. Buchmann, E. Dahmen, und A. H\u00fclsing, XMSS \u2013 A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 117\u2013129"},{"key":"1218_CR24","first-page":"368","volume-title":"SPHINCS: Practical Stateless Hash-Based Signatures","author":"DJ Bernstein","year":"2015","unstructured":"D. J. Bernstein, D. Hopwood, A. H\u00fclsing, T. Lange, R. Niederhagen, L. Papachristodoulou, M. Schneider, P. Schwabe, und Z. Wilcox- O\u2019Hearn, SPHINCS: Practical Stateless Hash-Based Signatures. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 368\u2013397"},{"key":"1218_CR25","unstructured":"ICAO, Doc 9303 \u2013 Machine Readable Travel Documents \u2013 Part 11: Security Mechanisms for MRTDs, 7th ed., International Civil Aviation Organization (ICAO), 2015."},{"key":"1218_CR26","unstructured":"Federal Information Processing Standards Publication (FIPS PUB), FIPS PUB 180-2: Secure Hash Standard, 2002."},{"key":"1218_CR27","doi-asserted-by":"crossref","unstructured":"L. K. Grover, \u201cA fast quantum mechanical algorithm for database search,\u201d in Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, ser. STOC \u201996. New York, NY, USA: ACM, 1996, pp. 212\u2013219","DOI":"10.1145\/237814.237866"},{"key":"1218_CR28","doi-asserted-by":"crossref","unstructured":"S. jen Chang, R. Perlner, W. E. Burr, M. S. Turan, J. M. Kelsey, S. Paul, L. E. Bassham, S. jen Chang, R. Perlner, W. E. Burr, M. S. Turan, J. M. Kelsey, S. Paul, L. E. Bassham, R. M. Blank, und A. Secretary, \u201cThird-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition,\u201d 2012.","DOI":"10.6028\/NIST.IR.7896"},{"key":"1218_CR29","unstructured":"S. Popov, \u201cThe tangle, https:\/\/www.iota.org\/research\/academic-papers,\u201d 2018."},{"key":"1218_CR30","doi-asserted-by":"crossref","unstructured":"N. Buchmann, C. Rathgeb, H. Baier, C. Busch, und M. Margraf, \u201cEnhancing breeder document long-term security using blockchain technology,\u201d in COMPSAC (2). IEEE Computer Society, 2017, pp. 744\u2013748.","DOI":"10.1109\/COMPSAC.2017.119"},{"key":"1218_CR31","unstructured":"O. Delgado-Mohatar, J. Fi\u00e9rrez, R. Tolosana, und R. Vera-Rodr\u0131\u0301guez, \u201cBlockchain and Biometrics: A first look into opportunities and challenges,\u201d in BLOCKCHAIN, ser. Advances in Intelligent Systems and Computing, vol. 1010. Springer, 2019, pp. 169\u2013177."},{"key":"1218_CR32","doi-asserted-by":"crossref","unstructured":"O. Delgado-Mohatar, J. Fi\u00e9rrez, R. Tolosana, und R. Vera-Rodr\u0131\u0301guez, \u201cBiometric template storage with Blockchain: A first look into cost and performance tradeoffs,\u201d CVPR Workshop on Biometrics, 2019.","DOI":"10.1109\/CVPRW.2019.00342"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-019-1218-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-019-1218-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-019-1218-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T11:20:28Z","timestamp":1665228028000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-019-1218-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,13]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["1218"],"URL":"https:\/\/doi.org\/10.1007\/s11623-019-1218-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,13]]},"assertion":[{"value":"13 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}