{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:12:36Z","timestamp":1725502356982},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/pst.2008.23","type":"proceedings-article","created":{"date-parts":[[2008,10,14]],"date-time":"2008-10-14T15:16:53Z","timestamp":1223997413000},"page":"36-47","source":"Crossref","is-referenced-by-count":5,"title":["A Multiple-Control Fuzzy Vault"],"prefix":"10.1109","author":[{"given":"Marianne","family":"Hirschbichler","sequence":"first","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Wageeh","family":"Boles","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827372"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.185"},{"key":"14","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/11527923_32","article-title":"fuzzy vault for fingerprints","author":"uludag","year":"2005","journal-title":"Audio- and Video-Based Biometric Person Authentication"},{"key":"11","first-page":"441","article-title":"an introduction to shared secret and\/or shared control schemes and their applications","author":"simmons","year":"1991","journal-title":"In Contemporary Cryptology The Science of Information Integrity"},{"key":"12","first-page":"593","article-title":"cryptography: theory and practice","author":"stinson","year":"2006","journal-title":"DiscreteMathematics and Its Applications Third Addition"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/982507.982516"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"7","first-page":"1","article-title":"a fuzzy vault scheme","author":"juels","year":"2002","journal-title":"IEEE International Symposium on Information Theory"},{"key":"6","first-page":"19","article-title":"biometric recognition: how do i know who you are?","author":"jain","year":"2005","journal-title":"ICIAP Lecture Notes in Computer Sience Vol 3617 Springer"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74484-9_100"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2006.264990"}],"event":{"name":"2008 Sixth Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2008,10,1]]},"location":"Fredericton, Canada","end":{"date-parts":[[2008,10,3]]}},"container-title":["2008 Sixth Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4641258\/4641259\/04641271.pdf?arnumber=4641271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T08:32:32Z","timestamp":1497774752000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4641271\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/pst.2008.23","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}