U. Uludag, S. Pankanti, S. Prabhakar, and A. Jain. Proc. of the IEEE, Special Issue on Multimedia Security for Digital
Rights Management, 92, page 948 -- 960. (2004)
H. Tanaka. CRYPTO '87: A Conference on the Theory and Applications of Cryptographic
Techniques on Advances in Cryptology, page 340--349. London, UK, Springer-Verlag, (1988)
Y. Sutcu, H. Sencar, and N. Memon. MM&Sec '05: Proceedings of the 7th workshop on Multimedia and security, page 111 -- 116. New York, NY, USA, ACM, (2005)
M. Rieback, B. Crispo, and A. Tanenbaum. PERCOM '06: Proceedings of the Fourth Annual IEEE International Conference
on Pervasive Computing and Communications (PERCOM'06), page 169--179. Washington, DC, USA, IEEE Computer Society, (2006)
A. Mukhamedov, S. Kremer, and E. Ritter. Revised Papers from the 9th International Conference on Financial
Cryptography and Data Security (FC'05), volume 3570 of Lecture Notes in Computer Science, page 255-269. Roseau, The Commonwealth Of Dominica, Springer, (August 2005)
A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, Springer Verlag, (1999)
A. Jain, K. Nandakumar, and A. Nagar. EURASIP Journal on Advances in Signal Processing, Special Issue on
Advanced Signal Processing and Pattern Recognition Methods for Biometrics, (2008)
S. Goldwasser, and S. Micali. STOC '82: Proceedings of the fourteenth annual ACM symposium on Theory
of computing, page 365--377. New York, NY, USA, ACM Press, (1982)
O. Goldreich, B. Pfitzmann, and R. Rivest. Advances in Cryptology - CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, page 153 -- 168. (1998)
C. Gentry, and A. Silverberg. Advances in Cryptology -- Asiacrypt'2002, Lecture Notes on Computer
Science 2501, page 548--566. Springer Verlag, (2002)See also Cryptology ePrint Archive, Report 2002/056..
U. Feige, A. Fiat, and A. Shamir. STOC '87: Proceedings of the nineteenth annual ACM conference on
Theory of computing, page 210--217. New York, NY, USA, ACM, (1987)
Y. Dodis, L. Reyzin, and A. Smith. In Proceedings of the International Conference on Advances in Cryptology
(EUROCRYPT '04), Lecture Notes in Computer Science, Springer Verlag, (2004)
Z. Chen, J. Huang, D. Huang, J. Zhang, and Y. Wang. 18th International Conference on Advanced Information Networking
and Applications (AINA 2004), 2, page 384--387. (2004)
D. Chaum, and T. Pedersen. CRYPTO '92: Proceedings of the 12th Annual International Cryptology
Conference on Advances in Cryptology, 740, page 89--105. London, UK, Springer Verlag, (1993)
R. Chadha, M. Kanovich, and A. Scedrov. CCS '01: Proceedings of the 8th ACM conference on Computer and Communications
Security, page 176--185. New York, NY, USA, ACM Press, (2001)
J. Cha, and J. Cheon. PKC '03: Proceedings of the 6th International Workshop on Theory
and Practice in Public Key Cryptography, page 18--30. London, UK, Springer-Verlag, (2003)
L. Bussard, Y. Roudier, and R. Molva. PERCOMW '04: Proceedings of the Second IEEE Annual Conference on
Pervasive Computing and Communications Workshops, page 122 -- 126. Washington, DC, USA, IEEE Computer Society, (2004)
A. Brömme. IFIP WG 9.6/11.7 Working Conference on Security and Control of IT
in Society (SCITS-II), Bratislava, Slovakia, June 15-16, page 145--156. Bratislava, Slovakia, (June 2001)