1. Automatic recognition of speakers from their voices
2. Optimal asymmetric encryption - How to encrypt with RSA. Extended abstract in Advances in Cryptology - Eurocrypt 94 Proceedings;M.Bellare;Lecture Notes in Computer Science,1995
3. Blonder, G. E. (2005). Graphical password. US Patent 5559961, Lucent Technologies Inc., Murray Hill, NJ.
4. Burr, W. E. (2000). Data encryption standard. In NIST (Ed.), A century of excellence in measurements, standards, and technology: A chronicle of selected NBS/NIST publications, 1901-2000. Retrieved from http://nvl.nist.gov/pub/nistpubs/sp958-lide/250-253.pdf
5. Speaker recognition: a tutorial