{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:18:29Z","timestamp":1730215109402,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/dicta.2008.81","type":"proceedings-article","created":{"date-parts":[[2008,12,9]],"date-time":"2008-12-09T22:03:29Z","timestamp":1228860209000},"page":"540-547","source":"Crossref","is-referenced-by-count":3,"title":["A Scheme for Enhancing Security Using Multiple Fingerprints and the Fuzzy Vault"],"prefix":"10.1109","author":[{"given":"Marianne","family":"Hirschbichler","sequence":"first","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Wageeh","family":"Boles","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/JPROC.2004.827372"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/CVPRW.2006.185"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1007\/11527923_32"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/359168.359176"},{"key":"14","first-page":"441","article-title":"an introduction to shared secret and\/or shared control schemes and their applications.","author":"simmons","year":"1991","journal-title":"In Contemporary Cryptology The Science of Information Integrity IEEE Press"},{"key":"11","article-title":"a multiplecontrol fuzzy vault","author":"hirschbichler","year":"2008","journal-title":"IEEE"},{"year":"2007","journal-title":"Australian Standard AS ISO\/IEC 19794 2-2007","article-title":"biometric data interchange formats: fingerprint minutiae data","key":"12"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/DICTA.2007.4426824"},{"key":"2","article-title":"noisy polynomial interpolation and noisy chinese remaindering","author":"bleichenbacher","year":"2000","journal-title":"EUROCRYPT Advances in Cryptology Proceedings of EUROCRYPT"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/509907.509934"},{"key":"10","first-page":"1","article-title":"a fuzzy vault scheme.","author":"juels","year":"2002","journal-title":"IEEE International Symposium on Information Theory"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/SFCS.1998.743426"},{"key":"6","first-page":"91","article-title":"shamir's scheme says it all","volume":"a37","author":"dawson","year":"1993","journal-title":"Sec"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/982507.982516"},{"key":"4","first-page":"358","article-title":"automatic alignment of fingerprint features for fuzzy fingerprint vault","volume":"3822","author":"chung","year":"2005","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/TIFS.2007.908165"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1007\/11553595_3"}],"event":{"name":"2008 Digital Image Computing: Techniques and Applications","start":{"date-parts":[[2008,12,1]]},"location":"Canberra, Australia","end":{"date-parts":[[2008,12,3]]}},"container-title":["2008 Digital Image Computing: Techniques and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4699977\/4699978\/04700069.pdf?arnumber=4700069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:52:11Z","timestamp":1489765931000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4700069\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/dicta.2008.81","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}