http://www.cs.sandia.gov/˜mccurley/healt/node8.html; “Biometric Authentication”, (1995). |
Press Release, “TrueTouch Demonstrates its Biometric Authentication Application Programmers Interface (BAAPI) at CardTech/SecurTech”, Apr., 1998. |
Oracle Advanced Networking Option Administrator's Guide, Chapter 8, (1996). |
AST-Presenting security using biometrics, www.multimania.com/ast/uk/uk-ID1.htm, Apr. 3, 1999. |
Kim, Hyun-Jung, Biometrics, Is it a Viable Proposition for Identity Authentication and Access Control?, Computers & Security, vol. 14, pp. 205-214 (1995). |
George, M.H., et al., A Robust Speaker Verification Biometric, Proceedings, the IEEE 29th International Carnahan Conference on Security Technology, pp. 41-46 (Oct. 1995). |
Davida, George I., On Enabling Secure Applications Through Off-line Biometric Identification, Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 148-157 (1998). |
Brown, Ann V., et al., Biometric Encryption: Information Privacy In a Networked World, EDI Forum: The Journal of Electronic Commerce, vol. 10, No. 3, pp. 37-43 (1997). |
Matyas, Mike, et al., Reversible data mixing procedure for efficient public-key encryption, Computers & Security, vol. 17, No. 3, pp. 265-272 (1998). |
ANSI Standard X9.31-1998Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA), pp. 1-64 (May 1998). |
Schneier, Bruce, Applied Cryptography: Protocols, Algorithms, and Source Code in C, pp. 442-445, 466-474 (Dec. 1995). |
Rivest et al. “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,” Communications of the ACM, vol. 21, No. 2, Feb. 1978, pp. 120-6. |