M. Abdalla, P. Fouque, and D. Pointcheval, Password-based authenticated key exchange in the three-party setting, PKC 2005, pp.65-84, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00918401

M. Abdalla and D. Pointcheval, Simple Password-Based Encrypted Key Exchange Protocols, CT-RSA 2005, pp.191-208, 2005.
DOI : 10.1007/978-3-540-30574-3_14

C. Barral, J. Coron, and D. Naccache, Externalized Fingerprint Matching, Biometric Authentication, First International Conference, pp.309-315, 2004.
DOI : 10.1007/978-3-540-25948-0_43

M. Bellare, R. Canetti, and H. Krawczyk, Modular approach to the design and analysis of key exchange protocols, 30th ACM STOC, pp.419-428, 1998.

M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, A concrete security treatment of symmetric encryption, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.394-403, 1997.
DOI : 10.1109/SFCS.1997.646128

M. Bellare, D. Pointcheval, and P. Rogaway, Authenticated Key Exchange Secure against Dictionary Attacks, LNCS, vol.1807, pp.139-155, 2000.
DOI : 10.1007/3-540-45539-6_11

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

M. Bellare and P. Rogaway, Entity Authentication and Key Distribution, CRYPTO'93, pp.232-249, 1994.
DOI : 10.1007/3-540-48329-2_21

M. Steven, M. Bellovin, and . Merritt, Encrypted key exchange: Password-based protocols secure against dictionary attacks, IEEE Symposium on Security and Privacy, pp.72-84, 1992.

. Bennett, . Brassard, and M. Crepeau, Generalized privacy amplification, ISIT, 1994.
DOI : 10.1109/isit.1994.394668

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.649.8666

A. Bhargav-spantzel, A. C. Squicciarini, S. Modi, M. Young, E. Bertino et al., Privacy preserving multi-factor authentication with biometrics
DOI : 10.3233/jcs-2007-15503

URL : http://doi.org/10.3233/jcs-2007-15503

X. Boyen, Reusable cryptographic fuzzy extractors, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.82-91, 2004.
DOI : 10.1145/1030083.1030096

X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith, Secure Remote Authentication Using Biometric Data, LNCS, vol.3494, pp.147-163, 2005.
DOI : 10.1007/11426639_9

V. Boyko, P. D. Mackenzie, and S. Patel, Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, LNCS, vol.1807, pp.156-171, 2000.
DOI : 10.1007/3-540-45539-6_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.7667

J. G. Brainard, A. Juels, R. L. Rivest, M. Szydlo, and M. Yung, Fourth-factor authentication, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.168-178, 2006.
DOI : 10.1145/1180405.1180427

R. Canetti, S. Halevi, J. Katz, Y. Lindell, and P. D. Mackenzie, Universally Composable Password-Based Key Exchange, LNCS, vol.3494, pp.404-421, 2005.
DOI : 10.1007/11426639_24

R. Canetti and H. Krawczyk, Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, LNCS, vol.2045, pp.453-474, 2001.
DOI : 10.1007/3-540-44987-6_28

R. Canetti and H. Krawczyk, Security Analysis of IKE???s Signature-Based Key-Exchange Protocol, LNCS, vol.2442120, pp.143-161, 2002.
DOI : 10.1007/3-540-45708-9_10

R. Canetti and H. Krawczyk, Universally Composable Notions of Key Exchange and Secure Channels, LNCS, vol.2332, pp.337-351, 2002.
DOI : 10.1007/3-540-46035-7_22

J. Daugman, How iris recognition works, pp.33-36, 2002.

J. Daugman, Iris recognition and anti-spoofing countermeasures, 7-th International Biometrics Conference, 2004.

W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

Y. Dodis, J. Katz, L. Reyzin, and A. Smith, Robust fuzzy extractors and authenticated key agreement from close secrets, LNCS, vol.4117, pp.232-250, 2006.

Y. Dodis, L. Reyzin, and A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, SIAM Journal on Computing, vol.38, issue.1, pp.523-540, 2004.
DOI : 10.1137/060651380

T. Elgamal, A public key cryptosystem and a signature scheme based on discrete logarithms, LNCS, vol.84, issue.196, pp.10-18, 1985.

S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984.
DOI : 10.1016/0022-0000(84)90070-9

S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof-systems, Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, pp.291-304, 1985.

S. Goldwasser, S. Micali, and R. L. Rivest, A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, vol.17, issue.2, pp.281-308, 1988.
DOI : 10.1137/0217017

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.8353

M. Jakobsson and S. Myers, Phishing and Counter-Measures, 2006.

A. Juels and M. Wattenberg, A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36, 1999.
DOI : 10.1145/319709.319714

C. Rackoff and D. R. Simon, Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack, LNCS, vol.576, issue.91, pp.433-444, 1992.
DOI : 10.1007/3-540-46766-1_35

V. Valencia, Biometric Liveness Testing, chapter 8, 2002.