A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.346-351, 2010. ,
DOI : 10.1109/IIHMSP.2010.91
Biometrie-Daten-Schutz. Funktionsprinzip und Chancen biometrischer Kryptosysteme, p.52, 2008. ,
Biometric Encryption. Positive-Sum Technology that Achieves Strong Authentication, Security and Privacy, Discussion paper of the Office of the Information and Privacy Commissioner of Ontario, 2007. ,
DOI : 10.1016/s0969-4765(07)70084-x
A Study on Iris Localization and Recognition on Mobile Phones, EURASIP Journal on Advances in Signal Processing, vol.44, issue.1, 2008. ,
DOI : 10.1142/S0219691303000025
URL : http://doi.org/10.1155/2008/281943
Biometric Authentication for a Mobile Personal Device, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, pp.1-3, 2006. ,
DOI : 10.1109/mobiqw.2006.361741
URL : http://eprints.eemcs.utwente.nl/15160/01/Tao06_Biometric_authentication_for_a_mobile_personal_device.pdf
Beyond the PIN: Enhancing user authentication for mobile devices, Computer Fraud & Security, vol.2008, issue.8, pp.12-17, 2008. ,
DOI : 10.1016/S1361-3723(08)70127-1
Optical sensors embedded within AMLCD panel, Proceedings of the 2007 workshop on Emerging displays technologies images and beyond: the future of displays and interacton, EDT '07, 2007. ,
DOI : 10.1145/1278240.1278247
Fingerprint verification by fusion of optical and capacitive sensors, Pattern Recognition Letters, vol.25, issue.11, pp.1315-1322, 2004. ,
DOI : 10.1016/j.patrec.2004.05.011
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.3295
Krypto für Jedermann Richtig verschlüsseln mit Linux Verschlüsselung unter Linux, heise Verlag, pp.192-195, 2011. ,
Secure Boot Revisited, 2008 The 9th International Conference for Young Computer Scientists, pp.2360-2365, 2008. ,
DOI : 10.1109/ICYCS.2008.535
Anonymous Authentication with TLS and DAA, Trust and trustworthy computing, pp.47-62, 2010. ,
DOI : 10.1007/978-3-642-13869-0_4
Analyzing trusted platform communication, ECRYPT Workshop, CRASH ? Cryptographic Advances in Secure Hardware, 2005. ,
Efficient Cryptographic Key Generation using Biometrics, International Journal of Computer Technology and Applications, vol.2, issue.1, pp.183-187, 2011. ,
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices, 2011 IEEE Symposium on Security and Privacy, pp.96-111, 2011. ,
DOI : 10.1109/SP.2011.29
Protecting Data on Mobile Devices: A Taxonomy of security threats to mobile computing and review of applicable defences, In: Information Knowledge Systems Management, vol.7, issue.12, pp.159-180, 2008. ,
Mobile Device Security Using Transient Authentication, IEEE Transactions on Mobile Computing, pp.1489-1502, 2006. ,
DOI : 10.1109/TMC.2006.169
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.8404
Implicit Authentication through Learning User Behavior, Proceedings of the 13th international conference on Information security, pp.99-113, 2011. ,
DOI : 10.1007/978-3-642-18178-8_9