1. Chikouche, Cherif, F., & Mohamed. An authentication protocol based on combined RFID-biometric system IJACS.
2. Das, & Goswami, A. (2014). A robust anonymous biometric-based remote user authentication scheme using smart cards (pp. 3–19). Elsevier.
3. Reddy, A., Ashok, Odelu, V., & Yoo, K.-Y. (2016). An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptical curve cryptography, PLOS ONE, 3–10.
4. Chaudhry, S. A., Mahmood, & Naqvi1, H. An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography.
5. Tyagi, N., Wang, J., Wen, K., & Zuo, D. (2015). Honey encryption applications implementation of an encryption scheme resilient to brute-force attacks. Spring.