1. Bhatla, T. P., Prabhu, V., & Dua, A. (2003). Understanding credit card frauds. iCards business review, 1(6). Retrieved September 9, 2013 from http://www.popcenter.org/problems/credit_card_fraud/PDFs/Bhatla.pdf
2. Camenisch, J., & Herreweghen, E. V. (2002). Design and implementation of the idemix anonymous credential system. In Proceedings of the 9th ACM conference on Computer and communications security.
3. Cherukuri, S., Venkatasubramanian, K. K., & Gupta, S. K. S. (2003). BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body. In Proceedings of International Conference on Parallel Processing Workshops.
4. CNSS (Committee on National Security Systems). (2010). Instruction No. 4009, National Information Assurance (IA) Glossary (CNSSI-4009). Retrieved September 9, 2013 from http://www.ncix.gov/publications/policy/docs/CNSSI_4009.pdf
5. Cornelius, C., & Kotz, D. (2010). On usable authentication for wireless body area networks. In Proceedings of the USENIX Workshop on Health Security and Privacy. USENIX Association. Retrieved September 9, 2013 from http://www.cs.dartmouth. edu/~dfk/papers/abstracts/cornelius-healthsec10.html