{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:07:49Z","timestamp":1729660069756,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/cse-euc-dcabes.2016.168","type":"proceedings-article","created":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T20:45:42Z","timestamp":1500324342000},"page":"99-105","source":"Crossref","is-referenced-by-count":0,"title":["LSKA: Location Similarity Based Key Agreement Scheme for Smartphone Networks"],"prefix":"10.1109","author":[{"given":"Tao","family":"Jing","sequence":"first","affiliation":[]},{"given":"Jie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Xiaoshuang","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Huo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1007\/11599548_31","article-title":"Automatic alignment of fingerprint features for fuzzy fingerprint vault","volume":"3882","author":"chung","year":"2005","journal-title":"Information Security and Cryptology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11527923_32"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2008.Workshops.20"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430549"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753199"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2037617"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"ref17","first-page":"1","article-title":"Securing fingerprint template: Fuzzy vault with minutiae descriptors","author":"nagar","year":"2008","journal-title":"Pattern Recognition"},{"key":"ref18","first-page":"299","article-title":"Fast polynomial reconstruction attack against fuzzy fingerprint vault","volume":"2","author":"yongchoi","year":"2011","journal-title":"Information Science and Service Science (NISS)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.185"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SETIT.2012.6481958"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2007.358434"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2015.63"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2009.5336914"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2008.63.69"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(97)82613-9"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-0938-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"}],"event":{"name":"2016 19th IEEE Intl Conference on Computational Science and Engineering (CSE), IEEE 14th Intl Conference on Embedded and Ubiquitous Computing (EUC), and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)","start":{"date-parts":[[2016,8,24]]},"location":"Paris","end":{"date-parts":[[2016,8,26]]}},"container-title":["2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7981485\/7982200\/07982230.pdf?arnumber=7982230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T16:48:53Z","timestamp":1569862133000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7982230\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/cse-euc-dcabes.2016.168","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}