1. Common Criteria for Information Technology Security Evaluation, v 2.1, 1999.
2. Department of Defense (1985). Trusted Computer System Evaluation Criteria.
3. Jain, A., Bolle, R. and Pankanti S. (1999). BIOMETRICS: Personal Identification in Networked Society. Kluwer Academic Publishers.
4. National Institute of Standards and Technology (1994 and 2001 ). Security Requirements for Cryptographic Modules, FIPS PUB 140–1 /2.
5. Newham, E. (1995). The biometric report. SBJ Services.