Q. Tang, J. Bringer, H. Chabanne, and D. Pointcheval, A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes, Proceedings of International Conference on Information Security Practice and Experience ISPEC 2008, pp.56-70, 2008.
DOI : 10.1007/978-3-540-79104-1_5

URL : https://hal.archives-ouvertes.fr/inria-00419156

A. K. Jain, A. Ross, and S. Pankanti, Biometrics: A Tool for Information Security, IEEE Transactions on Information Forensics and Security, vol.1, issue.2, pp.125-143, 2006.
DOI : 10.1109/TIFS.2006.873653

T. Ignatenko and F. M. Willems, Biometric Systems: Privacy and Secrecy Aspects, IEEE Transactions on Information Forensics and Security, vol.4, issue.4, pp.956-973, 2009.
DOI : 10.1109/TIFS.2009.2033228

URL : http://repository.tue.nl/669476

K. Arora and P. Garg, A Quantitative Survey of various Fingerprint Enhancement techniques, International Journal of Computer Applications, vol.28, issue.5, pp.24-28, 2011.
DOI : 10.5120/3383-4691

K. Surmacz and K. Saeed, Robust Algorithm for Fingerprint Identification with a Simple Image Descriptor, Proceedings of International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2011, CCIS, pp.137-144, 2011.
DOI : 10.2478/v10006-010-0024-4

M. Liu, X. Jiang, and A. C. Kot, Efficient fingerprint search based on database clustering, Pattern Recognition, vol.40, issue.6, pp.1793-1803, 2007.
DOI : 10.1016/j.patcog.2006.11.007

H. Xu, R. N. Veldhuis, A. M. Bazen, T. A. Kevenaar, T. A. Akkermans et al., Fingerprint Verification using Spectral Minutiae Representations, IEEE Transactions on Information Forensics and Security, vol.4, issue.3, pp.397-409, 2009.

M. Karnan, M. Akila, and N. Krishnaraj, Biometric personal authentication using keystroke dynamics: A review, Applied Soft Computing, vol.11, issue.2, pp.1565-1573, 2010.
DOI : 10.1016/j.asoc.2010.08.003

D. Rudrapal, S. Das, and S. Debbarma, Improvisation of Biometrics Authentication and Identification through Keystrokes Pattern Analysis, International Conference on Distributed Computing and Internet Technologies. ICDCIT 2014, pp.287-292, 2014.
DOI : 10.1007/978-3-319-04483-5_29

C. Hegde, H. R. Prabhu, D. S. Sagar, P. D. Shenoy, R. Venugopal et al., Human Authentication Based on ECG Waves Using Radon Transform, Proceedings of International Conference on Disaster Recovery and Business Continuity, pp.197-206, 2010.
DOI : 10.1109/TIP.2007.891157

H. Gurkan, U. Guz, and B. S. Yarman, Modeling of Electrocardiogram Signals Using Predefined Signature and Envelope Vector Sets, EURASIP Journal on Advances in Signal Processing, vol.2007, issue.1, pp.1-12, 2007.
DOI : 10.1016/j.medengphy.2005.02.007

D. Silva, H. P. Lourenço, A. Fred, A. L. Raposo, N. De-sousa et al., Check Your Biosignals Here: A new dataset for off-the-person ECG biometrics, Computer Methods and Programs in Biomedicine, vol.113, issue.2, pp.503-514, 2014.
DOI : 10.1016/j.cmpb.2013.11.017

Y. N. Singha, S. K. Singh, and . Gupta, Fusion of electrocardiogram with unobtrusive biometrics: An efficient individual authentication system, Pattern Recognition Letters, vol.33, issue.14, pp.1932-1941, 2012.
DOI : 10.1016/j.patrec.2012.03.010

Y. Isobe, T. Ohki, and . Komatsu, Security performance evaluation for biometric template protection techniques, International Journal of Biometrics, vol.5, issue.1, pp.53-72, 2013.
DOI : 10.1504/IJBM.2013.050733

H. Gao, Y. Zhang, S. Liang, and . Li, A new chaotic algorithm for image encryption, Chaos, Solitons & Fractals, vol.29, issue.2, pp.393-399, 2006.
DOI : 10.1016/j.chaos.2005.08.110

K. Nandakumar, A. Jain, and S. Pankanti, Fingerprint-Based Fuzzy Vault: Implementation and Performance, IEEE Transactions on Information Forensics and Security, vol.2, issue.4, pp.744-757, 2007.
DOI : 10.1109/TIFS.2007.908165

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.188.4945

M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar, Blind Authentication: A Secure Crypto-Biometric Verification Protocol, IEEE Transactions on Information Forensics and Security, vol.5, issue.2, pp.255-268, 2010.
DOI : 10.1109/TIFS.2010.2043188

Y. Sui, X. Zou, E. Y. Du, and F. Li, Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method, IEEE Transactions on Computers, vol.63, issue.4, pp.902-916, 2014.
DOI : 10.1109/TC.2013.25

A. T. Jin, D. N. Ling, and A. Goh, Biohashing: two factor authentication featuring fingerprint data and tokenised random number, Pattern Recognition, vol.37, issue.11, pp.2245-2255, 2004.
DOI : 10.1016/j.patcog.2004.04.011

N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, Generating Cancelable Fingerprint Templates, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.29, issue.4, pp.561-572, 2007.
DOI : 10.1109/TPAMI.2007.1004

C. T. Li and M. S. Hwang, An efficient biometrics-based remote user authentication scheme using smart cards, Journal of Network and Computer Applications, vol.33, issue.1, pp.1-5, 2010.
DOI : 10.1016/j.jnca.2009.08.001

C. I. Fan and Y. H. Lin, Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics, IEEE Transactions on Information Forensics and Security, vol.4, issue.4, pp.933-945, 2009.
DOI : 10.1109/TIFS.2009.2031942

H. Yeh, T. H. Chen, K. J. Hu, and W. K. Shih, Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data, IET Information Security, vol.7, issue.3, pp.247-252, 2013.
DOI : 10.1049/iet-ifs.2011.0348

X. Huang, Y. Xiang, A. Chonka, J. Zhou, and R. H. Deng, A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems, IEEE Transactions on Parallel and Distributed Systems, vol.22, issue.8, pp.1390-1397, 2011.
DOI : 10.1109/TPDS.2010.206

J. V. Monaco, N. Bakelman, S. Cha, and C. Tappert, Developing a Keystroke Biometric System for Continual Authentication of Computer Users, 2012 European Intelligence and Security Informatics Conference, pp.210-216, 2012.
DOI : 10.1109/EISIC.2012.58

B. Password and W. Paper, Available at: http://www. infosecurityproductsguide.com/ technology, Authentication Solutions through Keystroke Dynamics, 2007.

S. Wang, W. N. Lee, J. Provost, L. Jianwen, and E. E. Konofagou, A composite high-frame-rate system for clinical cardiovascular imaging, IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control, vol.55, issue.10, pp.2221-2233, 2008.
DOI : 10.1109/TUFFC.921

D. Moon, Y. Chung, C. Seo, S. Y. Kim, and J. N. Kim, A practical implementation of fuzzy fingerprint vault for smart cards, Journal of Intelligent Manufacturing, vol.5, issue.6, pp.293-302, 2014.
DOI : 10.1007/s10845-012-0656-3

A. Nagar, K. Nandakumar, and A. K. Jain, Multibiometric Cryptosystems Based on Feature-Level Fusion, IEEE Transactions on Information Forensics and Security, vol.7, issue.1, pp.255-268, 2012.
DOI : 10.1109/TIFS.2011.2166545