1. Ferguson, N., Schneier, B.: Practical Cryptography. Wiley, NJ, USA (2003)
2. ISO: Standing Document 2, version 5 – Harmonized Biometric Vocabulary. Technical Report ISO/IEC JTC 1/SC 37 N 1480 (2006)
3. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)
4. Cukic, B., Barlow, N.: Threats and countermeasures, In Proc. Biometric Consortium Conference, Washington DC, USA (2005)
5. Tilton, C: Biometrics in E-Authentication: Threat model. Biometrics Consortium Conference, Baltimore, MD, USA (2006)