1. M. Rejman-Greene, Security considerations in the use of biometric devices. Inf. Secur. Tech. Rep. 3, 77–80 (1998)
2. N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)
3. C. Roberts, Biometric attack vectors and defences. Comput. Secur. 26(1), 14–25 (2007)
4. C. Criteria, Biometric evaluation methodology supplement (BEM). Common methodology for information technology security evaluation (2002),
http://www.cesg.gov.uk/site/ast/biometrics/media/BEM_10.pdf
5. A. Matthews, Side-channel attacks on smartcards. Netw. Secur. 2006(12), 18–20 (2006)