Author of the publication

Improved Fingerprint Image Segmentation and Reconstruction of Low Quality Areas.

, , and . ICPR, page 1241-1244. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyclotomy Primality Proving - Recent Developments.. ANTS, volume 1423 of Lecture Notes in Computer Science, page 95-110. Springer, (1998)The Fuzzy Vault for fingerprints is Vulnerable to Brute Force Attack. CoRR, (2007)Fast Generation of Provable Primes Using Search in Arithmetic Progressions.. CRYPTO, volume 839 of Lecture Notes in Computer Science, page 282-293. Springer, (1994)Improved Fingerprint Image Segmentation and Reconstruction of Low Quality Areas., , and . ICPR, page 1241-1244. IEEE Computer Society, (2010)The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack., , and . BIOSIG, volume P-155 of LNI, page 43-54. GI, (2009)Generic Efficient Arithmetic Algorithms for PAFFs (Processor Adequate Finite Fields) and Related Algebraic Structures (Extended Abstract)., and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 320-334. Springer, (2003)A Primality Test Using Cyclotomic Extensions.. AAECC, volume 357 of Lecture Notes in Computer Science, page 310-323. Springer, (1988)The Generalized Fermat Equation., , and . Open Problems in Mathematics, Springer, (2016)Fast convolutions meet Montgomery.. Math. Comput., 77 (262): 1199-1221 (2008)Elliptic Gauss sums and applications to point counting., and . J. Symb. Comput., 45 (8): 825-836 (2010)