[1] F.A. Afsar, M. Arif, and M. Hussain, “Fingerprint identification and verification system using minutiae matching,” Proceedings of National Conference on Emerging Technologies, pp. 141-146, 2004.
[2] M. Burrows, M. Abadi, and R. Needham, “A logic of authentication,” ACM Transactions on Computer Systems, Vol. 23, No. 5, pp. 1-13, 1989.
[3] C.C. Chang and I.C. Lin, “Remarks on fingerprint-based remote user authentication scheme using smart cards,” ACM SIGOPS Operating Systems Review, Vol. 38, Issue 4 , pp. 91-96, 2004.
[4] L. Gong, Roger Needham, and Raphael Yahalom, “Reasoning about belief in cryptographic protocols,” Proceedings of the 1990 IEEE Computer Society Symposim on Research in Security and Privacy, pp. 234-246, 1990.
[5] H.S. Kim, J.K. Lee, and K.Y. Yoo, “ID-based password authentication scheme using smart cards and fingerprints,” ACM SIGOPS Operating Systems Review, Vol. 37, No. 4, pp. 32-41, 2003.
[6] C.H. Lin and Y.Y. Lai, “A flexible biometrics remote user authentication
Scheme,” Computer Standards & Interfaces, Vol. 27, Issue 1, pp. 19-23, 2004.
[7] J.K. Lee, S.R. Ryu and K.Y. Yoo, “Fingerprint-based remote user authentication scheme using smart cards,” Electronics Letters, Vol. 38, No. 12, pp. 554-555, 2002.
[8] V. Matyas Jr. and Z. Riha, “Toward reliable user authentication through biometrics,” IEEE Security & Privacy, Vol. 1, No. 3, pp. 45-49, 2003.
[9] C.J. Mitchell and Q. Tang, “Security of the Lin-Lai smart card based user authentication scheme,” Technical Report, http://www.rhul.ac.uk/mathematics/ techreports, 2005.
[10] D. M. Nessett, “A critique of the Burrows, Abadi, and Needham logic,” Operating System Review, Vol. 24, No. 2, pp. 35-38, 1990.
[11] M.O. Rabin, “Digitalized signatures and public-key functions as intractable as factorizations,” Technical Report, MIT/LCS/TR212, MIT Lab., Computer Science, Cambridge, Mass. Jan. 1979.
[12] M. Rejman-Greene, “Secure authentication using biometric methods,” Information Security Technical Report, Vol. 7, No. 3, pp. 30-40, 2002
[13] L. Rila and C. J. Mitchell, “Security protocols for biometrics-based cardholder authentication in smartcards,” Lecture Notes in Computer Science, Vol. 3482, Springer-Verlag, pp. 488-497, 2005.
[14] M. Scott, “Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints,” ACM SIGOPS Operating Systems Review, Vol. 38, Issue 2, pp. 73-75, 2004.
[15]U. Uludag, S. Pankanti, S. Prabhakar and A. K. Jain, “Biometric cryptosystems: issues and challenges,” Proceedings of The IEEE, Vol. 92, No. 6, 2004.
[16] 張景銘、王進賢, 實驗室規模指紋辨識系統之設計與實現, 國立中正大學電機工程研究所, 92年8月, 第五頁, 國家圖書館全國博碩士論文資訊網