| 2002 | biometric authentication systems | V´aclav Maty´aˇs Jr. Zdenˇek ˇR´ıha | a report |
| Biometric Security Technologies | Ayhan EMRE | a report | |
| 2003 | Biometrics FAQ | a summary | |
| 2000 | Cellular security: better, but foes still lurk | Riezenman, M.J.; | Spectrum, IEEE Volume 37, Issue 6, June 2000 Page(s):39 - 42 |
| 2005 | Methodological foundations: enabling the next generation of security | Maxion, R.A.; Roberts, R.R.M.; | Security & Privacy Magazine, IEEE Volume 3, Issue 2, March-April 2005 Page(s):54 - 57 |
| 2000 | NATIONAL BIOMETRIC TEST CENTER COLLECTED WORKS 1997-2000 | a paper collection | |
| Opportunities and Benefits - Vision of the Biometrics Working Group | Wu Jian Kang and Huang Weimin Kent Ridge Digital Lab, Singapore | a report | |
| 2000 | Parasitic authentication to protect your e-wallet | Ebringer, T.; Thorne, P.; Zheng, Y.; | Computer Volume 33, Issue 10, Oct. 2000 Page(s):54 - 60 |
| 2005 | Privacy issues on biometric systems | Faundez-Zanuy, M.; | Aerospace and Electronic Systems Magazine, IEEE Volume 20, Issue 2, Feb 2005 Page(s):13 - 15 |
| 2005 | Social acceptance of RFID as a biometric security method | Perakslis, C.; Wolk, R.; | Technology and Society, 2005. Weapons and Wires: Prevention and Safety in a Time of Fear. ISTAS 2005. Proceedings. 2005 International Symposium on June 8-10, 2005 Page(s):79 - 88 |
| 1999 | The growing “magic” of automatic identification | Swartz, J.; | Robotics & Automation Magazine, IEEE Volume 6, Issue 1, March 1999 Page(s):20 - 23, 56 |
| 2005 | Who are you? How to protect against identity theft | Elbirt, A.J.; | Technology and Society Magazine, IEEE Volume 24, Issue 2, Summer 2005 Page(s):5 - 8 |
| 2002 | Who goes there? [personal identity systems] | Spectrum, IEEE Volume 39, Issue 9, Sep 2002 Page(s):39 - 40 | |
| 2005 | 来自MIT人工智能实验室:如何做研究? | 不详 | 作者:不详 来源于:北邮PRIS共享天地 发布时间:2005-4-13 10:51:52 |



