. News, US employee 'outsourced job to china, p.21043693, 2013.

D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, Handbook of fingerprint recognition, 2009.
DOI : 10.1007/978-1-84882-254-2

A. K. Jain and S. Z. Li, Handbook of face recognition, 2011.

E. Shi, Y. Niu, M. Jakobsson, and C. Richard, Implicit Authentication through Learning User Behavior, Proceedings of ISC'2010, pp.99-113, 2011.
DOI : 10.1145/941311.941313

J. Bonneau, E. W. Felten, P. Mittal, and A. Narayanan, Privacy concerns of implicit secondary factors for web authentication, Adventures in Authentication, 2014.

Y. Lindell and B. Pinkas, Secure Multiparty Computation for Privacy Preserving Data Mining, Journal of Privacy and Confidentiality, vol.1, issue.1, p.5, 2009.
DOI : 10.4018/978-1-59140-557-3.ch189

N. A. Safa, R. Safavi-naini, and S. F. Shahandashti, Privacy-Preserving Implicit Authentication, Proceedings of SEC'2014, pp.471-484, 2014.
DOI : 10.1007/978-3-642-55415-5_40

URL : https://hal.archives-ouvertes.fr/hal-01370405

Y. Wang and K. N. Plataniotis, An Analysis of Random Projection for Changeable and Privacy-Preserving Biometric Verification, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol.40, issue.5, pp.1280-1293, 2010.
DOI : 10.1109/TSMCB.2009.2037131

M. Jr and F. J. , The kolmogorov-smirnov test for goodness of fit, Journal of the American Statistical Association, vol.46, issue.253, pp.68-78, 1951.

N. S. Altman, An introduction to kernel and nearest-neighbor nonparametric regression, The American Statistician, vol.46, issue.3, pp.175-185, 1992.
DOI : 10.2307/2685209

C. At&t-laboratories, An archive of AT&T laboratories cambridge, 2002.

F. S. Samaria and A. C. Harter, Parameterisation of a stochastic model for human face identification, Proceedings of 1994 IEEE Workshop on Applications of Computer Vision, pp.138-142, 1994.
DOI : 10.1109/ACV.1994.341300

M. M. Islam and R. Safavi-naini, POSTER, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1742-1744, 2016.
DOI : 10.1080/01621459.1951.10500769

H. Cooper, L. V. Hedges, and J. C. Valentine, The handbook of research synthesis and meta-analysis, 2009.

S. Dasgupta and A. Gupta, An elementary proof of a theorem of Johnson and Lindenstrauss, Random Structures and Algorithms, vol.15, issue.1, pp.60-65, 2003.
DOI : 10.1002/rsa.10073

E. Bingham and H. Mannila, Random projection in dimensionality reduction, Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '01, pp.245-250, 2001.
DOI : 10.1145/502512.502546

D. Achlioptas, Database-friendly random projections: Johnson-Lindenstrauss with binary coins, Journal of Computer and System Sciences, vol.66, issue.4, pp.671-687, 2003.
DOI : 10.1016/S0022-0000(03)00025-4

URL : https://doi.org/10.1016/s0022-0000(03)00025-4

J. W. Demmel and N. J. Higham, Improved Error Bounds for Underdetermined System Solvers, SIAM Journal on Matrix Analysis and Applications, vol.14, issue.1, pp.1-14, 1993.
DOI : 10.1137/0614001

K. Liu, H. Kargupta, and J. Ryan, Random projection-based multiplicative data perturbation for privacy preserving distributed data mining, IEEE Transactions on Knowledge and Data Engineering, vol.18, issue.1, pp.92-106, 2006.

C. K. Liew, U. J. Choi, and C. J. Liew, A data distortion by probability distribution, ACM Transactions on Database Systems, vol.10, issue.3, pp.395-411, 1985.
DOI : 10.1145/3979.4017

URL : http://paul.rutgers.edu/~xuehy58/p395-liew.pdf

E. Lefons, A. Silvestri, and F. Tangorra, An analytic approach to statistical databases, pp.260-274, 1983.

R. Agrawal and R. Srikant, Privacy-preserving data mining, ACM SIGMOD Record, vol.29, issue.2, pp.439-450, 2000.
DOI : 10.1145/335191.335438

K. Revett, Behavioral biometrics: a remote access approach, 2008.
DOI : 10.4018/978-1-60566-725-6.ch005

M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song, Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication, IEEE Transactions on Information Forensics and Security, vol.8, issue.1, pp.136-148, 2013.
DOI : 10.1109/TIFS.2012.2225048

M. Alimomeni and R. Safavi-naini, How to Prevent to Delegate Authentication, International Conference on SECURECOMM'2015, pp.477-499, 2015.
DOI : 10.1504/IJCAT.2009.024593