1. Phillips, P.J., Martin, A., Wilson, C.L., Przybocki, M.: An introduction evaluating biometric systems. Computer 33, 56–63 (2000)
2. Al-Assam, H., Hassan, W., Zeadally, S.: Automated biometric authentication with cloud computing. Biometric-Based Phys. Cybersecurity Syst., 455–475 (2019)
3. Hacker extracts crypto key from TPM chip - The H Security: News and Features (2010, 2019-10-08). http://www.h-online.com/security/news/item/Hacker-extracts-crypto-key-from-TPM-chip-927077.html
4. Latze, C., Ultes-Nitsche, U.: Stronger Authentication in E-Commerce - How to protect even na¨ıve Users against Phishing, Pharming, and MITM attacks. In: Presented at the IASTED International Conference on Communication Systems, Networks, and Applications (CSNA 2007) (2007)
5. Vangala, R., Sasi, S.: Biometric authentication for e-commerce transaction. In: Presented at the IEEE International Workshop on Imaging Systems and Techniques (IST) (2004)