O. Baudron, P. Fouque, D. Pointcheval, J. Stern, and G. Poupard, Practical multi-candidate election system, Proceedings of the twentieth annual ACM symposium on Principles of distributed computing , PODC '01, pp.274-283, 2001.
DOI : 10.1145/383962.384044

URL : https://hal.archives-ouvertes.fr/inria-00565273

A. Boldyreva, N. Chenette, Y. Lee, A. O-'neill, S. Capkun et al., Order-Preserving Symmetric Encryption Secure Localization with Hidden and Mobile Base Stations, Advances in Cryptology -EUROCRYPT 2009 Int'l Conf. on Computer Communication (INFOCOM 2006), 2006. 5. S. ? Capkun and J.-P. Hubaux. Secure Positioning of Wireless Devices with Application to Sensor Networks INFOCOM 2005: 24th Annual Joint Conf. of the IEEE Computer and Communications Societies, pp.224-241, 2005.

K. Chang, J. Hightower, and B. Kveton, Inferring Identity Using Accelerometers in Television Remote Controls, Pervasive Computing, pp.151-167, 2009.
DOI : 10.1007/978-3-642-01516-8_11

J. T. Chiang, J. J. Haas, and Y. Hu, Secure and precise location verification using distance bounding and simultaneous multilateration, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.181-192, 2009.
DOI : 10.1145/1514274.1514301

I. Damgård and M. Jurik, A Generalisation, a Simplification and some Applications of Paillier???s Probabilistic Public-Key System, Public Key Cryptography, pp.119-136, 2001.
DOI : 10.7146/brics.v7i45.20212

C. Gentry, A Fully Homomorphic Encryption Scheme, 2009.

C. Gentry and S. Halevi, Implementing Gentrys Fully-Homomorphic Encryption Scheme, Advances in Cryptology -EUROCRYPT 2011, pp.129-148, 2011.

O. Goldreich, S. Micali, and A. Wigderson, How to Play Any Mental Game -A Completeness Theorem for Protocols with Honest Majority, Proc. 19th ACM symposium on Theory of Computing, pp.218-229, 1987.

E. Haubert, J. Tucek, L. Brumbaugh, and W. Yurcik, Tamper-Resistant Storage Techniques for Multimedia Systems, Electronic Imaging 2005 International Society for Optics and Photonics, pp.30-40, 2005.

M. Jakobsson, E. Shi, P. Golle, and R. Chow, Implicit Authentication for Mobile Devices, Proc. of the 4th USENIX conf. on Hot Topics in Security. USENIX Association, 2009.

A. Kale, A. Rajagopalan, N. Cuntoor, and V. Krüger, Gait-based recognition of humans using continuous HMMs, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition, pp.336-341, 2002.
DOI : 10.1109/AFGR.2002.1004176

J. Krumm, Inference Attacks on Location Tracks, Pervasive Computing, pp.127-143, 2007.
DOI : 10.1007/978-3-540-72037-9_8

J. Leggett, G. Williams, M. Usnick, and M. Longnecker, Dynamic identity verification via keystroke characteristics, International Journal of Man-Machine Studies, vol.35, issue.6, pp.859-870, 1991.
DOI : 10.1016/S0020-7373(05)80165-8

S. Möller, C. Perlov, W. Jackson, C. Taussig, and S. R. Forrest, A polymer/semiconductor write-once read-many-times memory, Nature, vol.426, issue.6963, pp.426166-169, 2003.
DOI : 10.1038/nature02070

F. Monrose and A. Rubin, Authentication via keystroke dynamics, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.48-56, 1997.
DOI : 10.1145/266420.266434

M. Nisenson, I. Yariv, R. El-yaniv, and R. Meir, Towards Behaviometric Security Systems: Learning to Identify a Typist, Knowledge Discovery in Databases: PKDD 2003, pp.363-374, 2003.
DOI : 10.1007/978-3-540-39804-2_33

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in cryptology -EUROCRYPT99, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

N. A. Safa, R. Safavi-naini, and S. F. Shahandashti, Privacy-Preserving Implicit Authentication, Cryptology ePrint Archive, vol.203203, 2014.
DOI : 10.1007/978-3-642-55415-5_40

URL : https://hal.archives-ouvertes.fr/hal-01370405

S. F. Shahandashti, R. Safavi-naini, and P. Ogunbona, Private Fingerprint Matching, Information Security and Privacy, pp.426-433, 2012.
DOI : 10.1007/978-3-642-31448-3_32

D. Singelee and B. Preneel, Location verification using secure distance bounding protocols, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005., pp.840-846, 2005.
DOI : 10.1109/MAHSS.2005.1542879

K. Tan, G. Yan, J. Yeo, and D. Kotz, A correlation attack against user mobility privacy in a large-scale WLAN network, Proceedings of the 2010 ACM workshop on Wireless of the students, by the students, for the students, S3 '10, pp.33-36, 2010.
DOI : 10.1145/1860039.1860050

C. Tsai, C. Lee, and M. Hwang, Password Authentication Schemes: Current Status and Key Issues, IJ Network Security, vol.3, issue.2, pp.101-115, 2006.

D. Wang and J. Li, A New Fingerprint-Based Remote User Authentication Scheme Using Mobile Devices, Int'l Conf. on Apperceiving Computing and Intelligence Analysis, pp.65-68, 2009.

A. C. Yao, How to generate and exchange secrets, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), pp.162-167, 1986.
DOI : 10.1109/SFCS.1986.25