{"id":"https://openalex.org/W2050837051","doi":"https://doi.org/10.1109/hpcs.2010.5547122","title":"Securing cryptographic key with fuzzy vault based on a new chaff generation method","display_name":"Securing cryptographic key with fuzzy vault based on a new chaff generation method","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W2050837051","doi":"https://doi.org/10.1109/hpcs.2010.5547122","mag":"2050837051"},"language":"en","primary_location":{"id":"doi:10.1109/hpcs.2010.5547122","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcs.2010.5547122","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on High Performance Computing &amp; Simulation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083733149","display_name":"Mohamed Khalil-Hani","orcid":"https://orcid.org/0000-0002-2375-5719"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Mohamed Khalil-Hani","raw_affiliation_strings":["VLSI-eCAD Research Laboratory (VeCAD), Faculty of Electrical Engineering, Universiti Teknologi Malaysia, Johor, Malaysia","VLSI-eCAD Research Laboratory (VeCAD), Faculty of Electrical Engineering, University Teknologi Malaysia, 81310 UTM Skudai, Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"VLSI-eCAD Research Laboratory (VeCAD), Faculty of Electrical Engineering, Universiti Teknologi Malaysia, Johor, Malaysia","institution_ids":["https://openalex.org/I4576418"]},{"raw_affiliation_string":"VLSI-eCAD Research Laboratory (VeCAD), Faculty of Electrical Engineering, University Teknologi Malaysia, 81310 UTM Skudai, Johor, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058728255","display_name":"Rabia Bakhteri","orcid":null},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Rabia Bakhteri","raw_affiliation_strings":["VLSI-eCAD Research Laboratory (VeCAD), Faculty of Electrical Engineering, Universiti Teknologi Malaysia, Johor, Malaysia","VLSI-eCAD Research Laboratory (VeCAD), Faculty of Electrical Engineering, University Teknologi Malaysia, 81310 UTM Skudai, Johor, Malaysia"],"affiliations":[{"raw_affiliation_string":"VLSI-eCAD Research Laboratory (VeCAD), Faculty of Electrical Engineering, Universiti Teknologi Malaysia, Johor, Malaysia","institution_ids":["https://openalex.org/I4576418"]},{"raw_affiliation_string":"VLSI-eCAD Research Laboratory (VeCAD), Faculty of Electrical Engineering, University Teknologi Malaysia, 81310 UTM Skudai, Johor, Malaysia","institution_ids":["https://openalex.org/I4576418"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5083733149"],"corresponding_institution_ids":["https://openalex.org/I4576418"],"apc_list":null,"apc_paid":null,"fwci":1.6857,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.84022825,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7436367869377136},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7328857779502869},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.7160326838493347},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7045894861221313},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.642422616481781},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5051742196083069},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.4853702783584595},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45463910698890686},{"id":"https://openalex.org/keywords/chaff","display_name":"Chaff","score":0.43335703015327454},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4229414463043213},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4202287197113037},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4131622016429901},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3581783175468445},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3339839577674866},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2719288170337677},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20709392428398132}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7436367869377136},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7328857779502869},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.7160326838493347},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7045894861221313},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.642422616481781},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5051742196083069},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.4853702783584595},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45463910698890686},{"id":"https://openalex.org/C78573896","wikidata":"https://www.wikidata.org/wiki/Q30470787","display_name":"Chaff","level":2,"score":0.43335703015327454},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4229414463043213},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4202287197113037},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4131622016429901},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3581783175468445},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3339839577674866},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2719288170337677},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20709392428398132},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpcs.2010.5547122","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcs.2010.5547122","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on High Performance Computing &amp; Simulation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1560576635","https://openalex.org/W1577532209","https://openalex.org/W1991412763","https://openalex.org/W2010135280","https://openalex.org/W2032551902","https://openalex.org/W2047545178","https://openalex.org/W2071494543","https://openalex.org/W2106137793","https://openalex.org/W2110486492","https://openalex.org/W2110938040","https://openalex.org/W2114024372","https://openalex.org/W2128665168","https://openalex.org/W2144596760","https://openalex.org/W2148260769","https://openalex.org/W2150010995","https://openalex.org/W2165367855"],"related_works":["https://openalex.org/W1528334372","https://openalex.org/W1515856307","https://openalex.org/W2126445990","https://openalex.org/W197565096","https://openalex.org/W2092526533","https://openalex.org/W2352423969","https://openalex.org/W2347867225","https://openalex.org/W4387697456","https://openalex.org/W4387934469","https://openalex.org/W807354026"],"abstract_inverted_index":{"A":[0,16,46],"crucial":[1],"issue":[2],"in":[3,26,70,90,128],"the":[4,11,36,43,50,56,72,77,91,108,113,125,154],"design":[5,51],"of":[6,13,52,58,97,112,170],"a":[7,59,67,119,129,138,178],"cryptographic":[8,44],"system":[9,181],"is":[10,22,29,39,55,66,74,95,107,135,143,157,175],"problem":[12,21],"key":[14,73],"management.":[15],"state-of-the-art":[17],"solution":[18],"to":[19,23,41,49],"this":[20,34,105],"use":[24],"bio-cryptosystems,":[25],"which":[27,71,134],"cryptography":[28],"combined":[30],"with":[31,82],"biometrics.":[32],"In":[33],"solution,":[35],"user":[37],"biometrics":[38],"used":[40],"protect":[42],"key.":[45],"popular":[47],"approach":[48],"such":[53],"bio-cryptosystems":[54],"application":[57],"fuzzy":[60,92,126],"vault":[61,65,93,127],"scheme.":[62],"This":[63,116],"so-called":[64],"secure":[68],"storage":[69],"hidden":[75],"within":[76],"biometric":[78],"data":[79],"mixed":[80],"up":[81],"meaningless":[83],"chaff":[84,99,121,171],"points.":[85,100],"The":[86,131],"most":[87,109],"critical":[88],"operation":[89],"scheme":[94],"generation":[96,122],"these":[98],"Experiments":[101],"will":[102],"show":[103,152],"that":[104,153],"module":[106],"compute-intensive":[110],"part":[111],"whole":[114],"system.":[115],"paper":[117],"introduces":[118],"new":[120],"algorithm":[123,156],"for":[124,165,177],"bio-cryptosystem.":[130],"proposed":[132,155],"algorithm,":[133],"based":[136],"on":[137],"circle":[139],"packing":[140],"mathematical":[141],"theorem,":[142],"computationally":[144],"less":[145],"intensive":[146],"than":[147,162],"existing":[148,163],"methods.":[149],"Experimental":[150],"results":[151],"around":[158],"100":[159],"times":[160],"faster":[161],"methods":[164],"200,":[166],"and":[167,173],"above,":[168],"number":[169],"points,":[172],"therefore,":[174],"suitable":[176],"real-time":[179],"embedded":[180],"implementation.":[182]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
