A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes, Proceedings of International Conference on Information Security Practice and Experience ISPEC 2008, pp.56-70, 2008. ,
DOI : 10.1007/978-3-540-79104-1_5
URL : https://hal.archives-ouvertes.fr/inria-00419156
Biometrics: A Tool for Information Security, IEEE Transactions on Information Forensics and Security, vol.1, issue.2, pp.125-143, 2006. ,
DOI : 10.1109/TIFS.2006.873653
Biometric Systems: Privacy and Secrecy Aspects, IEEE Transactions on Information Forensics and Security, vol.4, issue.4, pp.956-973, 2009. ,
DOI : 10.1109/TIFS.2009.2033228
URL : http://repository.tue.nl/669476
A Quantitative Survey of various Fingerprint Enhancement techniques, International Journal of Computer Applications, vol.28, issue.5, pp.24-28, 2011. ,
DOI : 10.5120/3383-4691
Robust Algorithm for Fingerprint Identification with a Simple Image Descriptor, Proceedings of International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2011, CCIS, pp.137-144, 2011. ,
DOI : 10.2478/v10006-010-0024-4
Efficient fingerprint search based on database clustering, Pattern Recognition, vol.40, issue.6, pp.1793-1803, 2007. ,
DOI : 10.1016/j.patcog.2006.11.007
Fingerprint Verification using Spectral Minutiae Representations, IEEE Transactions on Information Forensics and Security, vol.4, issue.3, pp.397-409, 2009. ,
Biometric personal authentication using keystroke dynamics: A review, Applied Soft Computing, vol.11, issue.2, pp.1565-1573, 2010. ,
DOI : 10.1016/j.asoc.2010.08.003
Improvisation of Biometrics Authentication and Identification through Keystrokes Pattern Analysis, International Conference on Distributed Computing and Internet Technologies. ICDCIT 2014, pp.287-292, 2014. ,
DOI : 10.1007/978-3-319-04483-5_29
Human Authentication Based on ECG Waves Using Radon Transform, Proceedings of International Conference on Disaster Recovery and Business Continuity, pp.197-206, 2010. ,
DOI : 10.1109/TIP.2007.891157
Modeling of Electrocardiogram Signals Using Predefined Signature and Envelope Vector Sets, EURASIP Journal on Advances in Signal Processing, vol.2007, issue.1, pp.1-12, 2007. ,
DOI : 10.1016/j.medengphy.2005.02.007
Check Your Biosignals Here: A new dataset for off-the-person ECG biometrics, Computer Methods and Programs in Biomedicine, vol.113, issue.2, pp.503-514, 2014. ,
DOI : 10.1016/j.cmpb.2013.11.017
Fusion of electrocardiogram with unobtrusive biometrics: An efficient individual authentication system, Pattern Recognition Letters, vol.33, issue.14, pp.1932-1941, 2012. ,
DOI : 10.1016/j.patrec.2012.03.010
Security performance evaluation for biometric template protection techniques, International Journal of Biometrics, vol.5, issue.1, pp.53-72, 2013. ,
DOI : 10.1504/IJBM.2013.050733
A new chaotic algorithm for image encryption, Chaos, Solitons & Fractals, vol.29, issue.2, pp.393-399, 2006. ,
DOI : 10.1016/j.chaos.2005.08.110
Fingerprint-Based Fuzzy Vault: Implementation and Performance, IEEE Transactions on Information Forensics and Security, vol.2, issue.4, pp.744-757, 2007. ,
DOI : 10.1109/TIFS.2007.908165
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.188.4945
Blind Authentication: A Secure Crypto-Biometric Verification Protocol, IEEE Transactions on Information Forensics and Security, vol.5, issue.2, pp.255-268, 2010. ,
DOI : 10.1109/TIFS.2010.2043188
Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method, IEEE Transactions on Computers, vol.63, issue.4, pp.902-916, 2014. ,
DOI : 10.1109/TC.2013.25
Biohashing: two factor authentication featuring fingerprint data and tokenised random number, Pattern Recognition, vol.37, issue.11, pp.2245-2255, 2004. ,
DOI : 10.1016/j.patcog.2004.04.011
Generating Cancelable Fingerprint Templates, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.29, issue.4, pp.561-572, 2007. ,
DOI : 10.1109/TPAMI.2007.1004
An efficient biometrics-based remote user authentication scheme using smart cards, Journal of Network and Computer Applications, vol.33, issue.1, pp.1-5, 2010. ,
DOI : 10.1016/j.jnca.2009.08.001
Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics, IEEE Transactions on Information Forensics and Security, vol.4, issue.4, pp.933-945, 2009. ,
DOI : 10.1109/TIFS.2009.2031942
Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data, IET Information Security, vol.7, issue.3, pp.247-252, 2013. ,
DOI : 10.1049/iet-ifs.2011.0348
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems, IEEE Transactions on Parallel and Distributed Systems, vol.22, issue.8, pp.1390-1397, 2011. ,
DOI : 10.1109/TPDS.2010.206
Developing a Keystroke Biometric System for Continual Authentication of Computer Users, 2012 European Intelligence and Security Informatics Conference, pp.210-216, 2012. ,
DOI : 10.1109/EISIC.2012.58
Available at: http://www. infosecurityproductsguide.com/ technology, Authentication Solutions through Keystroke Dynamics, 2007. ,
A composite high-frame-rate system for clinical cardiovascular imaging, IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control, vol.55, issue.10, pp.2221-2233, 2008. ,
DOI : 10.1109/TUFFC.921
A practical implementation of fuzzy fingerprint vault for smart cards, Journal of Intelligent Manufacturing, vol.5, issue.6, pp.293-302, 2014. ,
DOI : 10.1007/s10845-012-0656-3
Multibiometric Cryptosystems Based on Feature-Level Fusion, IEEE Transactions on Information Forensics and Security, vol.7, issue.1, pp.255-268, 2012. ,
DOI : 10.1109/TIFS.2011.2166545