1. Andoni A, Indyk P (2008) Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Communications of the ACM 51(1):117–122
2. Bleichenbacher D, Nguyen PQ (2000) Noisy polynomial interpolation and noisy Chinese remaindering. In: Proc Nineteenth IACR Eurocrypt, Bruges, Belgium, pp 53–69
3. Boonchaiseree N, Areekul V (2009) Focal point detection based on half concentric lens model for singular point extraction in fingerprint. In: Proceedings of International Conference on Biometrics, pp 637–646
4. Boult TE, Scheirer WJ, Woodworth R (2007) Fingerprint revocable biotokens: accuracy and security analysis. In: Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp 1–8
5. Bringer J, Chabanne H, Cohen G, Kindarji B, Zémor G (2008) Theoretical and practical boundaries of binary secure sketches. IEEE Transactions on Information Forensics and Security 3(4):673–683