Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Remote website authentication using dynamic multi-scale code visualization., , , and . PST, page 325-328. IEEE, (2016)Recognition using robust bit extraction., , and . J. Electronic Imaging, 14 (4): 043016 (2005)Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network., , and . ISC, volume 2433 of Lecture Notes in Computer Science, page 446-458. Springer, (2002)Personalised cryptographic key generation based on FaceHashing., , and . Comput. Secur., 23 (7): 606-614 (2004)Analyzing Data Clusters: A Rough Sets Approach to Extract Cluster-Defining Symbolic Rules., , and . IDA, volume 2189 of Lecture Notes in Computer Science, page 248-257. Springer, (2001)Generation of one-time keys for single line authentication., , , and . PST, page 686-689. IEEE, (2016)Computation of Cryptographic Keys from Face Biometrics., and . Communications and Multimedia Security, volume 2828 of Lecture Notes in Computer Science, page 1-13. Springer, (2003)Eigenspace-Based Face Hashing., , and . ICBA, volume 3072 of Lecture Notes in Computer Science, page 195-199. Springer, (2004)Telemedicine and Medical Informatics in the Multimedia Super Corridor: The Malaysian Vision., , and . MedInfo, volume 52 of Studies in Health Technology and Informatics, page 1282-1286. IOS Press, (1998)A Web-Enabled Exam Preparation and Evaluation Service: Providing Real-Time Personalized Tests for Academic Enhancement., and . ICALT, page 441-442. IEEE Computer Society, (2001)