{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:45:18Z","timestamp":1725749118120},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642407789"},{"type":"electronic","value":"9783642407796"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40779-6_3","type":"book-chapter","created":{"date-parts":[[2013,9,16]],"date-time":"2013-09-16T07:32:11Z","timestamp":1379316731000},"page":"34-49","source":"Crossref","is-referenced-by-count":1,"title":["Client-Side Biometric Verification Based on Trusted Computing"],"prefix":"10.1007","author":[{"given":"Jan","family":"Vossaert","sequence":"first","affiliation":[]},{"given":"Jorn","family":"Lapon","sequence":"additional","affiliation":[]},{"given":"Bart","family":"De Decker","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Naessens","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-32805-3_5","volume-title":"Communications and Multimedia Security","author":"P. Bichsel","year":"2012","unstructured":"Bichsel, P., Camenisch, J., De Decker, B., Lapon, J., Naessens, V., Sommer, D.: Data-minimizing authentication goes mobile. In: De Decker, B., Chadwick, D.W. (eds.) CMS 2012. LNCS, vol.\u00a07394, pp. 55\u201371. Springer, Heidelberg (2012)"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1145\/1653662.1653734","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009","author":"P. Bichsel","year":"2009","unstructured":"Bichsel, P., Camenisch, J., Gro\u00df, T., Shoup, V.: Anonymous credentials on a standard java card. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 600\u2013610. ACM, New York (2009)"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-642-11145-7_14","volume-title":"Information and Communications Security","author":"M. Blanton","year":"2009","unstructured":"Blanton, M., Hudelson, W.M.P.: Biometric-based non-transferable anonymous credentials. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. LNCS, vol.\u00a05927, pp. 165\u2013180. Springer, Heidelberg (2009)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/3-540-49380-8_8","volume-title":"Information Hiding","author":"G. Bleumer","year":"1998","unstructured":"Bleumer, G.: Biometric yet privacy protecting person authentication. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 99\u2013110. Springer, Heidelberg (1998)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-642-32946-3_24","volume-title":"Financial Cryptography and Data Security","author":"F.F. Brasser","year":"2012","unstructured":"Brasser, F.F., Bugiel, S., Filyanov, A., Sadeghi, A.-R., Schulz, S.: Softer smartcards - usable cryptographic tokens with secure execution. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol.\u00a07397, pp. 329\u2013343. Springer, Heidelberg (2012)"},{"key":"3_CR6","first-page":"132","volume-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004","author":"E. Brickell","year":"2004","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 132\u2013145. ACM, New York (2004)"},{"key":"3_CR7","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/0-387-33406-8_12","volume-title":"Security and Privacy in Dynamic Environments","author":"J. Camenisch","year":"2006","unstructured":"Camenisch, J.: Protecting (anonymous) credentials with the trusted computing group\u2019s TPM V1.2. In: Fischer-H\u00fcbner, S., Rannenberg, K., Yngstr\u00f6m, L., Lindskog, S. (eds.) Security and Privacy in Dynamic Environments. IFIP, vol.\u00a0201, pp. 135\u2013147. Springer, Boston (2006)"},{"key":"3_CR8","first-page":"21","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002","author":"J. Camenisch","year":"2002","unstructured":"Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 21\u201330. ACM, New York (2002)"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"D. Chaum","year":"1993","unstructured":"Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 89\u2013105. Springer, Heidelberg (1993)"},{"key":"3_CR10","unstructured":"Intel Corporation. LaGrande technology preliminary architecture specification. Intel Publication no. D52212 (May 2006)"},{"issue":"3","key":"3_CR11","first-page":"253","volume":"3","author":"Y. Deswarte","year":"2010","unstructured":"Deswarte, Y., Gambs, S.: A proposal for a privacy-preserving national identity card. Trans. Data Privacy\u00a03(3), 253\u2013276 (2010)","journal-title":"Trans. Data Privacy"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-28368-0_25","volume-title":"Cryptography and Security: From Theory to Applications","author":"Y. Deswarte","year":"2012","unstructured":"Deswarte, Y., Gambs, S.: The challenges raised by the privacy-preserving identity card. In: Naccache, D. (ed.) Cryphtography and Security: From Theory to Applications. LNCS, vol.\u00a06805, pp. 383\u2013404. Springer, Heidelberg (2012)"},{"key":"3_CR13","unstructured":"Advanced\u00a0Micro Devices. AMD64 architecture programmer\u2019s manual: Volume 2: System programming. AMD Publication no. 24594 rev. 3.11 (December 2005)"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"key":"3_CR15","unstructured":"Trusted Computing Group. TCG TPM specification, https:\/\/2.zoppoz.workers.dev:443\/http\/www.trustedcomputinggroup.org\/resources\/tpm_main_specification"},{"issue":"9","key":"3_CR16","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F. Hao","year":"2006","unstructured":"Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput.\u00a055(9), 1081\u20131088 (2006)","journal-title":"IEEE Trans. Comput."},{"key":"3_CR17","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/1005140.1005150","volume-title":"Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003","author":"R. Impagliazzo","year":"2003","unstructured":"Impagliazzo, R., More, S.M.: Anonymous credentials with biometrically-enforced non-transferability. In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, pp. 60\u201371. ACM, New York (2003)"},{"key":"3_CR18","volume-title":"Handbook of Biometrics","author":"A.K. Jain","year":"2007","unstructured":"Jain, A.K., Flynn, P., Ross, A.A.: Handbook of Biometrics. Springer-Verlag New York, Inc., Secaucus (2007)"},{"key":"3_CR19","first-page":"1","volume":"113","author":"A.K. Jain","year":"2008","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process, 113:1\u2013113:17 (January 2008)","journal-title":"EURASIP J. Adv. Signal Process"},{"issue":"4","key":"3_CR20","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1145\/1357010.1352625","volume":"42","author":"J.M. McCune","year":"2008","unstructured":"McCune, J.M., Parno, B.J., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for tcb minimization. SIGOPS Oper. Syst. Rev.\u00a042(4), 315\u2013328 (2008)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"3_CR21","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-31909-9_14","volume-title":"Security and Privacy in Communication Networks","author":"W. Mostowski","year":"2012","unstructured":"Mostowski, W., Vullers, P.: Efficient U-Prove implementation for anonymous credentials on smart cards. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds.) SecureComm 2011. LNICST, vol.\u00a096, pp. 243\u2013260. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/2.zoppoz.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40779-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,6]],"date-time":"2022-03-06T02:19:09Z","timestamp":1646533149000},"score":1,"resource":{"primary":{"URL":"https:\/\/2.zoppoz.workers.dev:443\/http\/link.springer.com\/10.1007\/978-3-642-40779-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407789","9783642407796"],"references-count":21,"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1007\/978-3-642-40779-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}