1. T van der Putte, J Keuning, in Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications on Smart Card Research and Advanced Applications. Biometrical fingerprint recognition: don’t get your fingers burned (Kluwer Academic PublishersNorwell, MA, USA, 2001), pp. 289–303.
2. T Matsumoto, H Matsumoto, K Yamada, S Hoshino, Impact of artificial “gummy” fingers on fingerprint systems. Opt. Secur. Counterfeit Deterrence Tech.4677:, 275–289 (2002).
3. A Juels, M Wattenberg, in CCS ’99: Proceedings of the 6th ACM Conf on Comp and Comm Security. A fuzzy commitment scheme (ACMNew York, NY, USA, 1999), pp. 28–36, doi: 10.1145/319709.319714 10.1145/319709.319714. http://doi.acm.org/10.1145/319709.319714.
4. J-P Linnartz, P Tuyls, in New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates, ed. by J Kittler, Mark Nixon. Audio- and Video-Based Biometric Person Authentication: 4th International Conference, AVBPA 2003 Guildford, UK, June 9–11, 2003 Proceedings (Springer Berlin HeidelbergBerlin, Heidelberg, 2003), pp. 393–402, doi: 10.1007/3-540-44887-X_47 . http://dx.doi.org/10.1007/3-540-44887-X_47.
5. P Tuyls, B Škorić, T Kevenaar, Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Springer, Secaucus, NJ, USA, 2007).