1. Lecture Notes in Computer Science;M Adjedj,2009
2. Lecture Notes in Computer Science;M Barbosa,2008
3. Boneh D, Shacham H (2004) Group signatures with verifier-local revocation. In: Atluri V, Pfitzmann B, McDaniel PD (eds) ACM Conference on Computer and Communications Security. ACM, New York, pp 168–177
4. Lecture Notes in Computer Science;J Bringer,2008
5. Bringer J, Chabanne H (2011) Biometric identification paradigm: towards privacy and confidentiality protection. In: Nichols ER (ed) Biometrics: Theory, Applications, and Issues. Nova Science Publishers, New York