1. Bernd Grobauer, Tobias Walloschek and Elmar Stocker, Understanding Cloud-Computing Vulnerabilities, IEEE Security and Privacy, vol. 99, (2010).
2. J. Heiser and M. Nicolett, Assessing the security risks of cloud computing, " Gartner Report, 2009. [Online]. Available: http: /www. gartner. com/DisplayDocument, id=685308.
3. S. Dutta, A. Kar, N. C. Mahanti, and B. N. Chatterji, Network security using biometric and cryptography, in Proc. Adv. Concepts Intell. Vis. Syst. LNCS 5259.
4. Kim H. S and Yoo K. Y, ID-based Password Authentication Scheme Using Smart Card and Fingerprints, ACM SIGOPS Operating System Review, vol. 37, no. 2, pp.32-41, ISSN 0613-5980.
5. Fan C. I, Lin Y. H. and Hus R. H. Remote Password Authentication Scheme with Smart Cards and Biometics, Processings of the 49th annual IEEE Global Telecommunications Conference, pp.1-5, San Fracisco, California, USA, 27 NOV, (2006).