L. Ballard, F. Monrose, and D. Lopresti, Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing, To appear in Proceedings of the 15 th Annual USENIX Security Symposium, 2006.

G. Boccignone, A. Chianese, L. P. Cordella, and A. Marcelli, Recovering dynamic information from static handwriting, Pattern Recognition, vol.26, issue.3, pp.409-418, 1993.
DOI : 10.1016/0031-3203(93)90168-V

D. S. Doermann and A. Rosenfeld, Recovery of temporal information from static images of handwriting, International Journal of Computer Vision, vol.12, issue.3, pp.143-164, 1995.
DOI : 10.1007/BF01450853

S. J. Elliott, Development of a biometric testing protocol for dynamic signature verification, 7th International Conference on Control, Automation, Robotics and Vision, 2002. ICARCV 2002., 2002.
DOI : 10.1109/ICARCV.2002.1238521

M. C. Fairhurst, Signature verification revisited: promoting practical exploitation of biometric technology, Electronics & Communication Engineering Journal, vol.9, issue.6, pp.273-280, 1997.
DOI : 10.1049/ecej:19970606

H. Feng and C. Wah, Private key generation from on???line handwritten signatures, Information Management & Computer Security, vol.10, issue.4, pp.159-164, 2002.
DOI : 10.1108/09685220210436949

I. Guyon, Handwriting synthesis from handwritten glyphs, Proceedings of the Fifth International Workshop on Frontiers of Handwriting Recognition, 1996.

G. Hinton and V. Nair, Inferring motor programs from images of handwritten digits, Advances in Neural Information Processing Systems 18, 2006.

A. K. Jain, F. D. Griess, and S. D. Connell, On-line signature verification, Pattern Recognition, vol.35, issue.12, pp.2963-2972, 2002.
DOI : 10.1016/S0031-3203(01)00240-0

Y. W. Kuan, A. Goh, D. Ngo, and A. Teoh, Cryptographic keys from dynamic hand-signatures with biometric security preservation and replaceability, Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies, pp.27-32, 2005.

P. M. Lallican, C. Viard-gaudin, and S. Knerr, From offline to on-line handwriting recognition, Proceedings of the Seventh International Workshop on Frontiers in Handwriting Recognition, p.303312, 2000.

K. K. Lau, P. C. Yuen, and Y. Y. Tang, Recovery of writing sequence of static images of handwriting using UWM, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings., pp.1123-1128, 2003.
DOI : 10.1109/ICDAR.2003.1227831

D. P. Lopresti and J. D. Raim, The Effectiveness of Generative Attacks on an Online Handwriting Biometric, Proceedings of the International Conference on Audio-and Video-based Biometric Person Authentication, pp.1090-1099, 2005.
DOI : 10.1007/11527923_113

F. Monrose, M. Reiter, Q. Li, D. Lopresti, and C. Shih, Towards speech-generated cryptographic keys on resource-constrained devices, Proceedings of the Eleventh USENIX Security Symposium, pp.283-296, 2002.

R. Plamondon, A delta-lognormal model for handwriting generation, Proceedings of the Seventh Biennal Conference of the International Graphonomics Society, pp.126-127, 1995.

K. Price, Bibliography: On-line signatures, 2006.

U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, Biometric cryptosystems: issues and challenges, Proceedings of the IEEE: Special Issue on Multimedia Security of Digital Rights Management, pp.948-960, 2004.
DOI : 10.1109/JPROC.2004.827372

URL : http://biometrics.cse.msu.edu/Uludagetal_Cryptosystems_ProcIEEE04.pdf

T. Varga, D. Kilchhofer, and H. Bunke, Template-based synthetic handwriting generation for the training of recognition systems, Proceedings of the 12th Conference of the International Graphonomics Society, pp.206-211, 2005.

C. Vielhauer and R. Steinmetz, Handwriting: Feature Correlation Analysis for Biometric Hashes, EURASIP Journal on Advances in Signal Processing, vol.2004, issue.4, pp.542-558, 2004.
DOI : 10.1155/S1110865704309248

URL : http://doi.org/10.1155/s1110865704309248

C. Vielhauer, R. Steinmetz, and A. Mayerhofer, Biometric hash based on statistical features of online signatures, Object recognition supported by user interaction for service robots, pp.123-126, 2002.
DOI : 10.1109/ICPR.2002.1044628

C. Vielhauer and F. Zöbisch, A test tool to support brute-force online and offline signature forgery tests on mobile devices, Proceedings of the International Conference on Multimedia and Expo, pp.225-228, 2003.

D. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi et al., SVC2004: First International Signature Verification Competition, Proceedings of the International Conference on Biometric Authentication (ICBA), Hong Kong, 2004.
DOI : 10.1007/978-3-540-25948-0_3