1. [1] B. Schneier, “The Uses and Abuses of Biometrics, ” Communication of ACM, vol. 42, no. 8, 1999.
2. [2] A. B. J. Teoh, D. C. L. Ngo, and A. Goh, “Biohashing: two factor authentication featuring fingerprint data and tokenized random number, ” Pattern Recognition, vol. 37, pp. 2245-2255, 2004.
3. [3] W. K. Yip, A. Goh, D. C. L. Ngo, and A. B. J. Teoh, “Cryptographic Keys from Dynamic Hand-signatures with Biometric Secrecy Preservation and Replaceability, ” Fourth IEEE International Conference on Autom. Identification Advanced Technol. (AutoID), pp. 27-31, 2005.
4. Practical Biometric Authentication with Template Protection
5. [5] X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith, “Secure remote authentication using biometric data, ” Advances in Cryptology EUROCRYPT, 2005.