Author of the publication

A Survey of Automatic Facial Micro-expression Analysis: Databases, Methods and Challenges.

, , , , and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR., , , , and . EURASIP J. Wirel. Commun. Netw., (2012)Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud., , , , and . IEEE Trans. Dependable Secur. Comput., 11 (5): 467-479 (2014)Improved Related-key Attacks on Desx and Desx+., and . Cryptologia, 32 (1): 13-22 (2008)An authentication framework for peer-to-peer cloud., , , , , and . SIN, page 94-101. ACM, (2013)Advanced Slide Attacks Revisited: Realigning Slide on DES.. Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 263-276. Springer, (2005)Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs., and . IWDW, volume 3304 of Lecture Notes in Computer Science, page 184-191. Springer, (2004)Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES).. Inf. Process. Lett., 91 (1): 33-38 (2004)On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation., and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 136-146. Springer, (2005)On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards., and . ICCSA (1), volume 3480 of Lecture Notes in Computer Science, page 488-497. Springer, (2005)Providing Security in 4G Systems: Unveiling the Challenges., , , and . AICT, page 439-444. IEEE Computer Society, (2010)