D. Boneh, X. Boyen, and H. Shacham, Short Group Signatures, Lecture Notes in Computer Science, vol.3152, pp.41-55, 2004.
DOI : 10.1007/978-3-540-28628-8_3

D. Boneh and H. Shacham, Group signatures with verifier-local revocation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.168-177, 2004.
DOI : 10.1145/1030083.1030106

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.8033

X. Boyen, Reusable cryptographic fuzzy extractors, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.82-91, 2004.
DOI : 10.1145/1030083.1030096

URL : http://ai.stanford.edu/~xb/ccs04/fuzzysecure.pdf

X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith, Secure Remote Authentication Using Biometric Data, Advances in Cryptology ? EUROCRYPT 2005, pp.147-163, 2005.
DOI : 10.1007/11426639_9

URL : http://ai.stanford.edu/~xb/eurocrypt05b/fuzzy-full.ps

J. G. Brainard, A. Juels, R. L. Rivest, M. Szydlo, and M. Yung, Fourth-factor authentication, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.168-178, 2006.
DOI : 10.1145/1180405.1180427

J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zémor, Optimal Iris Fuzzy Sketches, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, 2007.
DOI : 10.1109/BTAS.2007.4401904

URL : https://hal.archives-ouvertes.fr/hal-00270547

G. D. Crescenzo, R. Graveman, R. Ge, and G. Arce, Approximate Message Authentication and Biometric Entity Authentication, Financial Cryptography and Data Security, 9th International Conference, pp.240-254, 2005.
DOI : 10.1007/11507840_22

Y. Dodis, J. Katz, L. Reyzin, and A. Smith, Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets, Advances in Cryptology ? CRYPTO 2006, pp.232-250, 2006.
DOI : 10.1007/11818175_14

Y. Dodis, L. Reyzin, and A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Advances in Cryptology ? EU- ROCRYPT 2004, pp.523-540, 2004.
DOI : 10.1137/060651380

A. Juels and M. Sudan, A fuzzy vault scheme. Design Codes and Cryptography, pp.237-257, 2006.

A. Juels and M. Wattenberg, A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36, 1999.
DOI : 10.1145/319709.319714

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.763

J. M. Linnartz and P. Tuyls, New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates, 4th International Conference, pp.393-402, 2003.
DOI : 10.1007/3-540-44887-X_47

X. Liu, K. W. Bowyer, and P. J. Flynn, Iris Recognition and Verification Experiments with Improved Segmentation Method, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID), pp.17-18, 2005.

K. Nandakumar, A. K. Jain, and S. Pankanti, Fingerprint-Based Fuzzy Vault: Implementation and Performance, IEEE Transactions on Information Forensics and Security, vol.2, issue.4, 2008.
DOI : 10.1109/TIFS.2007.908165

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.188.4945

P. Tuyls, A. H. Akkermans, T. A. Kevenaar, G. J. Schrijen, A. M. Bazen et al., Practical Biometric Authentication with Template Protection
DOI : 10.1007/11527923_45

N. K. Jain and . Ratha, Audio-and Video-Based Biometric Person Authentication, 5th International Conference, pp.436-446, 2005.

P. Tuyls and J. Goseling, Capacity and Examples of Template-Protecting Biometric Authentication Systems, ECCV Workshop BioAW, pp.158-170, 2004.
DOI : 10.1007/978-3-540-25976-3_15

P. Tuyls, E. Verbitskiy, J. Goseling, and D. Denteneer, Privacy protecting biometric authentication systems: an overview, 2004.