1. S. Sutradhar and Crypto++, "Fuzzy Vault for fingerprints: Security analysis and improvements," in Proc. Int. Workshop Cryptol. Netw. Secur., Berlin, Germany, 2004, pp. 289-303.
2. C. Blundo, M. Matyáš, and O. Stěpánková, "Fuzzy vaults: Closing the gap between cryptography and biometrics," in Security and Cryptography for Networks, Berlin, Germany, 2012, pp. 1-14.
3. P. Tuyls, A. Akkermans, T. Kevenaar, and G. Schrijen, "Cryptographic security of fuzzy extractor-based biometric authentication systems," in Topics in Cryptology—CT-RSA 2007, Berlin, Germany, 2007, pp. 352-369.
4. Y. Hao, Y. Zhang, and X. Wang, "Fuzzy vault for healthcare data: A survey," J. Med. Syst., vol. 38, no. 12, p. 142, 2014.
5. M. Li, M. H. Amini, X. Cheng, and Y. Zhang, "Fuzzy vault for health monitoring data with privacy preserving retrieval," IEEE Trans. Inf. Forensics Secur., vol. 13, no. 10, pp. 2423-2436, 2018.