1. Understanding the Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations;Adams,1999
2. A.K. Jain, 50 years of biometric research: the (almost) solved, the unsolved, and the unexplored, In: Proceedings of the 5th International Conference on Biometrics, keynotes, Madrid, Spain, June, 2013.
3. A. Juels and M. Wattenberg, A fuzzy commitment scheme, In: Proceedings of the 6th ACM Conference on Computer and Communications Security, 1999, pp. 28–36.
4. A. Juels and M. Sudan, A fuzzy vault scheme, In: Proceedings of IEEE International Symposium on Information Theory, Lausanne, Switzerland, 2002.
5. A. Biometric template security;Jain;EURASIP J. Adv. Signal Process.,2008