Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Issues, System Design.. Encyclopedia of Biometrics, Springer US, (2015)Fusion in Multibiometric Identification Systems: What about the Missing Data?., , and . ICB, volume 5558 of Lecture Notes in Computer Science, page 743-752. Springer, (2009)Hardening Fingerprint Fuzzy Vault Using Password., , and . ICB, volume 4642 of Lecture Notes in Computer Science, page 927-937. Springer, (2007)Decentralized Privacy-Preserving Netting Protocol on Blockchain for Payment Systems., , , , , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 137-155. Springer, (2020)Score normalization in multimodal biometric systems., , and . Pattern Recognit., 38 (12): 2270-2285 (2005)Biometric Template Security., , and . EURASIP J. Adv. Signal Process., (2008)Secure one-time biometrie tokens for non-repudiable multi-party transactions., , , and . WIFS, page 1-6. IEEE, (2017)A Coarse-to-Fine Pseudo-Labeling (C2FPL) Framework for Unsupervised Video Anomaly Detection., , , and . CoRR, (2023)How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning., , , , and . CoRR, (2020)Byzantine-Tolerant Methods for Distributed Variational Inequalities., , , , , , and . CoRR, (2023)