1. Adler, A. (2003), ‘Can images be regenerated from biometric templates?’, Biometrics Conference, Washington.
2. Alkassar, A. and Husseiki, R. (eds.) (2008), FIDIS Deliverable D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management, Download: http://www.fidis. net/fileadmin/fidis/deliverables/fidis-wp3-del3.9_Study_on_the_Impact_of_Trusted_Computing_on_Identity_and_Identity_Management.pdf .
3. Alrodhan, W. A. and Mitchell, C. J. (2007), ‘Addressing privacy issues in CardSpace’, Third International Symposium on Information Assurance and Security (IAS 2007), IEEE Computer Society, pp. 285–291.
4. Article 29 Data Protection Working Party (Art29DPWP) (2003), Working Document on Biometrics, WP 80, Brussels. http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2003/wp80_en.pdf .
5. Article 29 Data Protection Working Party (Art29DPWP) (2004), Opinion on More Harmonised Information Provisions, WP 100, Brussels. http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2004/wp100_en.pdf .