1. High-speed and secure PRNG for cryptographic applications;Hu;Int J Comput Network and Inf Security,2020
2. Cryptography using artificial intelligence;Blackledge,2015
3. Combining crypto with biometrics effectively;Hao;IEEE Trans Comput,2006
4. Dutta, S., Kar, A., Mahanti, N.C., & Chatterji, B.N. (2008). Network Security Using Biometric and Cryptography. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5259 LNCS, 38–44. https://doi.org/10.1007/978-3-540-88458-3_4.
5. Xi, K., & Hu, J. (2010). Bio-Cryptography. Handbook of Information and Communication Security, 129–57. https://doi.org/10.1007/978-3-642-04117-4_7.