{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T19:11:24Z","timestamp":1725304284097},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFB2700200","2021YFA1000600"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302271","61772383","U1836202","62076187","62172303"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2023QF088","ZR2023MF045"],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014761","name":"Natural Science Foundation of Qingdao Municipality","doi-asserted-by":"publisher","award":["23-2-1-152-zyyd-jch"],"id":[{"id":"10.13039\/501100014761","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shandong University Young Scholars Future Program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/tnet.2023.3311130","type":"journal-article","created":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T17:48:20Z","timestamp":1694627300000},"page":"1110-1123","source":"Crossref","is-referenced-by-count":0,"title":["UFinAKA: Fingerprint-Based Authentication and Key Agreement With Updatable Blind Credentials"],"prefix":"10.1109","volume":"32","author":[{"given":"Mei","family":"Wang","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology and the Key Laboratory of Cryptologic Technology, Shandong University, Qingdao, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7212-5297","authenticated-orcid":false,"given":"Jing","family":"Chen","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3472-419X","authenticated-orcid":false,"given":"Kun","family":"He","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0905-5158","authenticated-orcid":false,"given":"Ruozhou","family":"Yu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[{"name":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA"}]},{"given":"Zhihao","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"The dangers of key reuse: Practical attacks on IPsec IKE","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Felsch"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.2478\/popets-2019-0039"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/3460120.3484746"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/RISP.1992.213269"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/978-3-642-30057-8_23"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/SP.2015.41"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-031-15979-4_24"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/3488932.3523256"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-3-540-68914-0_17"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-662-49890-3_5"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-319-78372-7_13"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TDSC.2017.2700305"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-030-64834-3_26"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/s00145-020-09367-8"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-3-031-17146-8_17"},{"volume-title":"General Data Protection Regulation","year":"2023","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TrustCom50675.2020.00149"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TIFS.2021.3073802"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TIFS.2022.3228494"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1201\/9781420010756"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/s00145-001-0017-4"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/978-3-031-16815-4_18"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref24","first-page":"90","article-title":"Efficient privacy-preserving biometric identification","volume-title":"Proc. 17th Conf. Netw. Distrib. Syst. Secur. Symp.","author":"Huang"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/1536414.1536440"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TrustCom53373.2021.00079"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/362686.362692"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/2508859.2516701"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/359168.359176"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/ICB.2013.6612973"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TIFS.2018.2838540"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/1854229.1854270"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/276698.276854"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1007\/978-3-319-57048-8_6"},{"volume-title":"Fvc2004","year":"2023","key":"ref35"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.14722\/ndss.2020.24203"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1007\/978-3-030-40186-3_10"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1007\/978-3-030-92068-5_23"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/TII.2022.3145584"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1007\/11426639_24"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1007\/978-3-030-01446-9_21"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1007\/978-3-319-78372-7_15"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1007\/978-3-030-26954-8_26"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/SP40000.2020.00031"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1007\/978-3-030-56784-2_10"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1007\/11426639_9"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1007\/978-3-540-24676-3_31"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/tits.2022.3169182"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/10505042\/10250445.pdf?arnumber=10250445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T18:05:58Z","timestamp":1725300358000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10250445\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":48,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2023.3311130","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}