iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/SECPRI.2001.924299
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:43:29Z","timestamp":1730295809657,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/secpri.2001.924299","type":"proceedings-article","created":{"date-parts":[[2002,11,13]],"date-time":"2002-11-13T10:01:54Z","timestamp":1037181714000},"page":"202-213","source":"Crossref","is-referenced-by-count":143,"title":["Cryptographic key generation from voice"],"prefix":"10.1109","author":[{"given":"F.","family":"Monrose","sequence":"first","affiliation":[]},{"given":"M.K.","family":"Reiter","sequence":"additional","affiliation":[]},{"family":"Qi Li","sequence":"additional","affiliation":[]},{"given":"S.","family":"Wetzel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Proceedings of the 2nd USENIX Security Work-shop","article-title":"Foiling the cracker: A survey of, and improvements to, password security","year":"1990","author":"klein","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/100.755812"},{"key":"ref12","first-page":"35","article-title":"A matched filter approach to endpoint detection for robust speaker verification","author":"li","year":"1999","journal-title":"Proceedings of IEEE Workshop on Automatic Identification Advanced Technologies (AutoID‘99)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(96)00003-X"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1994.394764"},{"key":"ref15","first-page":"73","article-title":"Password hardening based on keystroke dynamics","author":"monrose","year":"1999","journal-title":"Proceedings of the 6thACM Conference on Computer and Communications Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/35.46670"},{"journal-title":"Fundamentals of Speech Recog-nition","year":"1993","author":"rabiner","key":"ref18"},{"journal-title":"Computer speech technology","year":"1999","author":"rodman","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.1992.253755"},{"journal-title":"Proceedings of the 1999 Network and Distributed System Security Symposium","article-title":"A real-world analysis of Kerberos password security","year":"1999","author":"wu","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674831"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1985.13345"},{"journal-title":"Discrete-Time Processing of Speech Signals","year":"1993","author":"deller","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1973.9030"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_6"},{"volume":"1","journal-title":"Entropy Measures and Unconditional Security in Cryp-tography ETH Series in Information Security and Cryptography","year":"1997","author":"cachin","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1976.10155"},{"key":"ref20","first-page":"701","article-title":"Recent research in automatic speaker recognition","author":"rosenberg","year":"1992","journal-title":"Advances in Speech Signal Processing"},{"journal-title":"Proceedings of the 3rd USENIX Security Symposium","article-title":"Observations on reusable password choices","year":"1992","author":"spafford","key":"ref22"},{"journal-title":"inforworld com","article-title":"PDAs learn to listen up","year":"2000","author":"schwartz","key":"ref21"},{"key":"ref24","first-page":"245","article-title":"Secure private key generation using a fingerprint","volume":"1","author":"soutar","year":"1996","journal-title":"Cardtech\/Securetech Conference Proceedings"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.1998.738941"},{"key":"ref26","first-page":"46","article-title":"Iris recognition technology","author":"williams","year":"1996","journal-title":"1996 International Carnahan Conference on Security Technology"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1054010"}],"event":{"name":"2001 IEEE Symposium on Security and Privacy. S&P 2001","acronym":"SECPRI-01","location":"Oakland, CA, USA"},"container-title":["Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7367\/19992\/00924299.pdf?arnumber=924299","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T17:40:34Z","timestamp":1489167634000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/924299\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/secpri.2001.924299","relation":{},"subject":[]}}