I. Buhan, E. Kelkboom, and K. Simoens, A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.346-351, 2010.
DOI : 10.1109/IIHMSP.2010.91

J. Merkle, Biometrie-Daten-Schutz. Funktionsprinzip und Chancen biometrischer Kryptosysteme, p.52, 2008.

A. Cavoukian and A. Stoianov, Biometric Encryption. Positive-Sum Technology that Achieves Strong Authentication, Security and Privacy, Discussion paper of the Office of the Information and Privacy Commissioner of Ontario, 2007.
DOI : 10.1016/s0969-4765(07)70084-x

K. R. Park, H. Park, B. J. Kang, E. C. Lee, and D. S. Jeong, A Study on Iris Localization and Recognition on Mobile Phones, EURASIP Journal on Advances in Signal Processing, vol.44, issue.1, 2008.
DOI : 10.1142/S0219691303000025

URL : http://doi.org/10.1155/2008/281943

Q. Tao and R. N. Veldhuis, Biometric Authentication for a Mobile Personal Device, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, pp.1-3, 2006.
DOI : 10.1109/mobiqw.2006.361741

URL : http://eprints.eemcs.utwente.nl/15160/01/Tao06_Biometric_authentication_for_a_mobile_personal_device.pdf

S. Furnell, N. Clarke, and S. Karatzouni, Beyond the PIN: Enhancing user authentication for mobile devices, Computer Fraud & Security, vol.2008, issue.8, pp.12-17, 2008.
DOI : 10.1016/S1361-3723(08)70127-1

A. Abileah and P. Green, Optical sensors embedded within AMLCD panel, Proceedings of the 2007 workshop on Emerging displays technologies images and beyond: the future of displays and interacton, EDT '07, 2007.
DOI : 10.1145/1278240.1278247

G. L. Marcialis and F. Roli, Fingerprint verification by fusion of optical and capacitive sensors, Pattern Recognition Letters, vol.25, issue.11, pp.1315-1322, 2004.
DOI : 10.1016/j.patrec.2004.05.011

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Schmidt, Krypto für Jedermann Richtig verschlüsseln mit Linux Verschlüsselung unter Linux, heise Verlag, pp.192-195, 2011.

K. Dietrich and J. Winter, Secure Boot Revisited, 2008 The 9th International Conference for Young Computer Scientists, pp.2360-2365, 2008.
DOI : 10.1109/ICYCS.2008.535

E. Cesena, H. Löhr, G. Ramunno, A. Sadeghi, and D. Vernizzi, Anonymous Authentication with TLS and DAA, Trust and trustworthy computing, pp.47-62, 2010.
DOI : 10.1007/978-3-642-13869-0_4

K. Kursawe, D. Schellekens, and B. Preneel, Analyzing trusted platform communication, ECRYPT Workshop, CRASH ? Cryptographic Advances in Secure Hardware, 2005.

R. Trivedi, T. Seshadri, and R. , Efficient Cryptographic Key Generation using Biometrics, International Journal of Computer Technology and Applications, vol.2, issue.1, pp.183-187, 2011.

M. Becher, F. C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck et al., Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices, 2011 IEEE Symposium on Security and Privacy, pp.96-111, 2011.
DOI : 10.1109/SP.2011.29

J. Friedman and D. V. Hoffman, Protecting Data on Mobile Devices: A Taxonomy of security threats to mobile computing and review of applicable defences, In: Information Knowledge Systems Management, vol.7, issue.12, pp.159-180, 2008.

A. J. Nicholson, M. D. Corner, and B. D. Noble, Mobile Device Security Using Transient Authentication, IEEE Transactions on Mobile Computing, pp.1489-1502, 2006.
DOI : 10.1109/TMC.2006.169

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

E. Shi, Y. Niu, M. Jakobsson, and R. Chow, Implicit Authentication through Learning User Behavior, Proceedings of the 13th international conference on Information security, pp.99-113, 2011.
DOI : 10.1007/978-3-642-18178-8_9