On the (non-)reusability of fuzzy sketches and extractors and security in the computational setting | IEEE Conference Publication | IEEE Xplore