M. J. Atallah, K. B. Frikken, M. T. Goodrich, and R. Tamassia, Secure Biometric Authentication for Weak Computational Devices, In Financial Cryptography, pp.357-371, 2005.
DOI : 10.1007/11507840_32

R. M. Bolle, J. H. Connell, and N. K. Ratha, Biometric perils and patches, Pattern Recognition, vol.35, issue.12, pp.2727-2738, 2002.
DOI : 10.1016/S0031-3203(01)00247-3

X. Boyen, Reusable cryptographic fuzzy extractors, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.82-91, 2004.
DOI : 10.1145/1030083.1030096

X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith, Secure Remote Authentication Using Biometric Data, Advances in Cryptology -EUROCRYPT 2005, pp.147-163, 2005.
DOI : 10.1007/11426639_9

J. Bringer, H. Chabanne, M. Izabachène, D. Pointcheval, Q. Tang et al., An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication, Information Security and Privacy, 12th Australasian Conference, ACISP 2007 Proceedings, pp.96-106, 2007.
DOI : 10.1007/978-3-540-73458-1_8

J. Bringer, H. Chabanne, D. Pointcheval, and Q. Tang, Extended Private Information Retrieval and Its Application in Biometrics Authentications, To appear in Proceedings of CANS 2007, 2007.
DOI : 10.1007/978-3-540-76969-9_12

B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, Private information retrieval, Journal of the ACM, vol.45, issue.6, pp.965-981, 1998.
DOI : 10.1145/293347.293350

G. D. Crescenzo, R. Graveman, R. Ge, and G. Arce, Approximate Message Authentication and Biometric Entity Authentication, Financial Cryptography and Data Security, 9th International Conference, pp.240-254, 2005.
DOI : 10.1007/11507840_22

G. D. Crescenzo, T. Malkin, and R. Ostrovsky, Single Database Private Information Retrieval Implies Oblivious Transfer, Advances in Cryptology -EUROCRYPT 2000, pp.122-138, 2000.
DOI : 10.1007/3-540-45539-6_10

Y. Dodis, J. Katz, L. Reyzin, and A. Smith, Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets, Lecture Notes in Computer Science, vol.4117, pp.232-250, 2006.
DOI : 10.1007/11818175_14

Y. Dodis, L. Reyzin, and A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Advances in Cryptology -EUROCRYPT 2004, pp.523-540, 2004.
DOI : 10.1137/060651380

W. Du and M. J. Atallah, Secure multi-party computation problems and their applications, Proceedings of the 2001 workshop on New security paradigms , NSPW '01, pp.13-22, 2001.
DOI : 10.1145/508171.508174

C. Gentry and Z. Ramzan, Single-Database Private Information Retrieval with Constant Communication Rate, Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, pp.803-815, 2005.
DOI : 10.1007/11523468_65

Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin, Protecting data privacy in private information retrieval schemes, Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, pp.151-160, 1998.
DOI : 10.1145/276698.276723

F. Hao, R. Anderson, and J. Daugman, Combining crypto with biometrics effectively, IEEE Transactions on Computers, vol.55, issue.9, pp.1081-1088, 2006.

A. Juels and M. Sudan, A fuzzy vault scheme, Proceedings IEEE International Symposium on Information Theory,, pp.237-257, 2006.
DOI : 10.1109/ISIT.2002.1023680

A. Juels and M. Wattenberg, A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36, 1999.
DOI : 10.1145/319709.319714

J. M. Linnartz and P. Tuyls, New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates, 4th International Conference, pp.393-402, 2003.
DOI : 10.1007/3-540-44887-X_47

D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, 2003.
DOI : 10.1007/978-1-84882-254-2

A. Pashalidis and C. J. Mitchell, A Taxonomy of Single Sign-On Systems, Information Security and Privacy, 8th Australasian Conference, pp.249-264, 2003.
DOI : 10.1007/3-540-45067-X_22

N. Ratha, J. Connell, R. M. Bolle, and S. Chikkerur, Cancelable Biometrics: A Case Study in Fingerprints, 18th International Conference on Pattern Recognition (ICPR'06), pp.370-373, 2006.
DOI : 10.1109/ICPR.2006.353

N. K. Ratha, J. H. Connell, and R. M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol.40, issue.3, pp.614-634, 2001.
DOI : 10.1147/sj.403.0614

R. Safavi-naini and D. Tonien, Fuzzy universal hashing and approximate authentication. Cryptology ePrint Archive, Report, vol.256, 2005.

B. Schneier, Inside risks: the uses and abuses of biometrics, Communications of the ACM, vol.42, issue.8, p.136, 1999.
DOI : 10.1145/310930.310988

B. Schoenmakers and P. Tuyls, Efficient Binary Conversion for Paillier Encrypted Values, EUROCRYPT, pp.522-537, 2006.
DOI : 10.1007/11761679_31

P. Tuyls, A. H. Akkermans, T. A. Kevenaar, G. J. Schrijen, A. M. Bazen et al., Practical Biometric Authentication with Template Protection, Audioand Video-Based Biometric Person Authentication, 5th International Conference, pp.436-446, 2005.
DOI : 10.1007/11527923_45

P. Tuyls and J. Goseling, Capacity and Examples of Template-Protecting Biometric Authentication Systems, ECCV Workshop BioAW, pp.158-170, 2004.
DOI : 10.1007/978-3-540-25976-3_15

P. Tuyls, B. Skoric, and T. Kevenaar, Security with Noisy Data, 2008.
DOI : 10.1007/978-1-84628-984-2

P. Tuyls, E. Verbitskiy, J. Goseling, and D. Denteneer, Privacy protecting biometric authentication systems: an overview, 2004.

U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, Biometric cryptosystems: issues and challenges, Proceedings of the IEEE, pp.948-960, 2004.
DOI : 10.1109/JPROC.2004.827372

E. Verbitskiy, P. Tuyls, D. Denteneer, and J. P. Linnartz, Reliable biometric authentication with privacy protection, SPIE Biometric Technology for Human Identification Conf, 2004.

M. J. Atallah and W. Du, Protocols for secure remote database access with approximate matching, 2000.