Cavoukian, A. (2013). Privacy-by-Design: Leadership,
methods, and results. In European Data Protection:
Coming of Age, pages 175–202.
Delvaux, N., Chabanne, H., Bringer, J., Kindarji, B., Lin-
deberg, P., Midgren, J., Breebaart, J., Akkermans,
T. H., van der Veen, M., Veldhuis, R. N. J., Kindt, E.,
Simoens, K., Busch, C., Bours, P., Gafurov, D., Yang,
B., Stern, J., Rust, C., Cucinelli, B., and Skepastianos,
D. (2008). Pseudo-identities based on fingerprint char-
acteristics. In 4th International Conference on In-
telligent Information Hiding and Multimedia Signal
Processing (IIH-MSP 2008), Harbin, China, August
2008, Proceedings, pages 1063–1068.
di Vimercati, S. D. C., Foresti, S., Livraga, G., Paraboschi,
S., and Samarati, P. (2015). Privacy in pervasive sys-
tems: Social and legal aspects and technical solutions.
In Data Management in Pervasive Systems, pages 43–
65.
EU (2016). European General Data Protection Regulation
2016/679, http://eur-lex.europa.eu/homepage.html.
Fidelity (2015). European Project Fidelity, http://fidelity-
project.eu/.
Furnell, S. (2015). From passwords to biometrics - in pur-
suit of a panacea. In ICISSP 2015 - Proceedings of
the 1st International Conference on Information Sys-
tems Security and Privacy, ESEO, Angers, Loire Val-
ley, France, February, 2015., pages IS–7.
Gafurov, D., Bours, P., Yang, B., and Busch, C. (2013). In-
dependent performance evaluation of pseudonymous
identifier fingerprint verification algorithms. In Image
Analysis and Recognition - 10th International Confer-
ence, ICIAR 2013, P
´
ovoa do Varzim, Portugal, June,
2013. Proceedings, pages 63–71.
ISO (2008). ISO/IEC 19092/2008, Financial Services –
Biometrics – Security Framework.
ISO (2011). ISO/IEC 24745/2011, Information Technology
- Security Techniques - Biometric Information Protec-
tion.
ISO (2016). ISO 13491-1:2016, Financial Services – Se-
cure Cryptographic Devices – Part 1: Concepts, Re-
quirements and Evaluation Methods.
ISO (2017). ISO/IEC 2382-37/2017, Information Technol-
ogy - Vocabulary - Part 37: Biometrics.
Kaur, H. and Khanna, P. (2016). Biometric template
protection using cancelable biometrics and visual
cryptography techniques. Multimedia Tools Appl.,
75(23):16333–16361.
Kindt, E. (2009). The use of privacy enhancing technologies
for biometric systems analysed from a legal perspec-
tive. In Privacy and Identity Management for Life -
5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife In-
ternational Summer School, Nice, France, September,
2009, Revised Selected Papers, pages 134–145.
Li, S. Z. and Jain, A. K., editors (2015). Encyclopedia of
Biometrics, Second Edition. Springer US.
Lim, M., Teoh, A. B. J., and Kim, J. (2015). Biometric
feature-type transformation: Making templates com-
patible for secret protection. IEEE Signal Process.
Mag., 32(5):77–87.
Martinez-Diaz, M., Fi
´
errez, J., Galbally, J., and Ortega-
Garcia, J. (2011). An evaluation of indirect attacks
and countermeasures in fingerprint verification sys-
tems. Pattern Recognition Letters, 32(12):1643–1651.
Miltgen, C. L., Popovic, A., and Oliveira, T. (2013). De-
terminants of end-user acceptance of biometrics: In-
tegrating the ”big 3” of technology acceptance with
privacy context. Decision Support Systems, 56:103–
114.
Mordini, E. and Tzovaras, D. (2012). Second generation
biometrics: The ethical, legal and social context, vol-
ume 11. Springer Netherlands.
Mrdakovi
´
c, M. and Adamovi
´
c, S. (2015). Privacy friendly
biometrics. In Proceedings of Synthesis 2015 - In-
ternational Scientific Conference of IT and Business-
Related Research, Belgrade, Singidunum University,
Serbia,, pages 67–70.
Msgna, M. G., Ferradi, H., Akram, R. N., and Markan-
tonakis, K. (2016). Secure application execution in
mobile devices. In The New Codebreakers - Essays
Dedicated to David Kahn on the Occasion of His 85th
Birthday, pages 417–438.
Nandakumar, K. and Jain, A. K. (2015). Biometric tem-
plate protection: Bridging the performance gap be-
tween theory and practice. IEEE Signal Process.
Mag., 32(5):88–100.
Ngo, D., Teoh, A., and Hu, J. (2015). Biometric security.
Cambridge Scholars, Newcastle upon Tyne.
Podio, F. L. (2011). Biometric technologies and security -
international biometric standards development activi-
ties. In Encyclopedia of Cryptography and Security,
2nd Ed., pages 124–130.
Prabhakar, S., Pankanti, S., and Jain, A. K. (2003). Biomet-
ric recognition: Security and privacy concerns. IEEE
Security & Privacy, 1(2):33–42.
Ratha, N. K., Connell, J. H., and Bolle, R. M. (2001).
Enhancing security and privacy in biometrics-based
authentication systems. IBM Systems Journal,
40(3):614–634.
Rebera, A. P., Bonfanti, M. E., and Venier, S. (2014). So-
cietal and ethical implications of anti-spoofing tech-
nologies in biometrics. Science and Engineering
Ethics, 20(1):155–169.
Riccio, D., Galdi, C., and Manzo, R. (2016). Bio-
metric/cryptographic keys binding based on function
minimization. In 12th International Conference on
Signal-Image Technology & Internet-Based Systems,
Naples, Italy, December, 2016, pages 144–150.
Toli, C. and Preneel, B. (2015). Provoking security:
Spoofing attacks against crypto-biometric systems. In
2015 World Congress on Internet Security WorldCIS,
Dublin, Ireland, October, 2015, pages 67–72.
Turbine (2011). European Project Turbine: TrUsted
Revocable Biometric IdeNtitiEs, http://cordis.europa.
eu/project/rcn/85447.html.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
360