Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the vulnerability of face verification systems to hill-climbing attacks., , , , and . Pattern Recognit., 43 (3): 1027-1038 (2010)Benchmarking Touchscreen Biometrics for Mobile Authentication., , , , and . IEEE Trans. Inf. Forensics Secur., 13 (11): 2720-2733 (2018)A New Multimodal Approach for Password Strength Estimation - Part II: Experimental Evaluation., , and . IEEE Trans. Inf. Forensics Secur., 12 (12): 2845-2860 (2017)Exploring a statistical method for touchscreen swipe biometrics., , , , and . ICCST, page 1-4. IEEE, (2017)Quality Analysis of Dynamic Signature Based on the Sigma-Lognormal Model., , , and . ICDAR, page 633-637. IEEE Computer Society, (2011)Enhanced on-line signature verification based on skilled forgery detection using Sigma-LogNormal Features., , , , and . ICB, page 501-506. IEEE, (2015)Fingerprint Quality: Mapping NFIQ1 Classes and NFIQ2 Values., , , , and . ICB, page 1-8. IEEE, (2019)Mobile signature verification: feature robustness and performance comparison., , , and . IET Biom., 3 (4): 267-277 (2014)A probabilistic framework for improved password strength metrics., , and . ICCST, page 1-6. IEEE, (2014)Variable-length template protection based on homomorphic encryption with application to signature biometrics., , and . IWBF, page 1-6. IEEE, (2016)