1. Rejman-Greene: Security considerations in the use of biometric devices. Information Security Technical Report 3, 77–80 (1998)
2. Ratha, N.K., Connell, J.H.B.R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3), 614–634 (2001)
3. Roberts, C.: Biometric attack vectors and defences. Computers & Security 26(1), 14–25 (2007)
4. Criteria, C.: Biometric evaluation methodology supplement (bem). Common Methodology for Information Technology Security Evaluation -
http://www.cesg.gov.uk/site/ast/biometrics/media/BEM_10.pdf
(2002)
5. Matthews, A.: Side-channel attacks on smartcards. Network Security 2006(12), 18–20 (2006)