1. Stallings, W.: Cryptography and Network Security – Principles and Practices, 3rd edn. Pearson Education, London (2004)
2. Trivedi, A.K., Arora, R., Kapoor, R., Sanyal, S., Abraham, A., Sanyal, S.: Mobile Ad Hoc Network Security Vulnerabilities. IGI Global (2009)
3. Maio, M.D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)
4. Li, S.Z., Jain, A.K.: Handbook of Face Recognition. Springer, Heidelberg (2005)
5. Fessi, B.A., Ben Abdallah, S., Boudriga, H.M.: A new genetic algorithm approach for intrusion response system in computer networks. In: IEEE Symposium on Computers and Communications (2009)