Bibliography
[1] A. K. Jain. Biometric recognition: How do I know who you are?
In SCIA, 2005.
[2] Simon Liu and Mark Silverman. A Practical Guide to Biometric Security
Technology. IT Professional, 2001.
[3] Network Associates and Affiliated Companies. Identity Theft Kit.
An Australian Government Initiative, 2004.
[4] Australian Government. Biometric Initiative.
http://www.border.gov.au/, 2006.
[5] Whitfield Diffie and Martin Hellman. New Directions in Cryptography.
IEEE Transactions on Information Theory, 1976.
[6] Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. Cryptographic
Communications System and Method. U.S. Patent #4,405,829, US Patent
and Trade Office,Washington DC, September 20 1983. MIT, Cambridge,
MA.
[7] Bruce Schneier. Applied Cryptography (Second Edition).
John Wiley &
Sons, 1996.
[8] Mihir Bellare and Oded Goldreich. On defining proofs of knowledge.
In Ernest F. Brickell, editor, Advances in Cryptology, Springer-Verlag, 1993.
[9] Ari Juels and Martin Wattenberg. A Fuzzy Commitment Scheme.
In ACM Conference on Computer and Communications Security, 1999.
[10] Ari Juels and Madhu Sudan. A Fuzzy Vault Scheme.
In IEEE International
Symposium on Information Theory, 2002.
[11] U. Uludag and A. K. Jain. Securing Fingerprint Template:
Fuzzy Vault
with Helper Data. In Privacy Research in Vision, 2006.
[12] U. Uludag, S. Pankanti, and A. K. Jain. Fuzzy Vault for Fingerprints.
In Audio- and Video-Based Biometric Person Authentication,
2005.
[13] Adi Shamir. How to Share a Secret. Commun. ACM, 1979.