1. Adams, C.: Achieving non-transferability in credential systems using hidden biometrics. Secur. Commun. Netw. 4(2), 195–206 (2011)
2. LNCS;M Adjedj,2009
3. Adler, A.: Vulnerabilities in biometric encryption systems. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) Audio- and Video-Based Biometric Person Authentication. 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, 20–22 July 2005. LNCS, vol. 3546, pp. 1100–1109. Springer, Heidelberg (2005)
4. Barni, M., Bianchi, T., Catalano, D., Raimondo, M.D., Labati, R.D., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F., Piva, A.: Privacy-preserving fingercode authentication. In: Proceedings of the 12th ACM Workshop on Multimedia and Security (MMSec 2010), pp. 231–240. ACM, New York (2010)
5. LNCS;J Bringer,2008