Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hadamard Matrices and their Applications: Progress 2007--2010. Cryptography and Communications, 2 (2): 129--154 (2010)Failure of affine-based reconstruction attack in regenerating vascular feature points., , , and . IET Biom., 10 (5): 497-517 (2021)Differentially 2-Uniform Cocycles - The Binary Case.. AAECC, volume 2643 of Lecture Notes in Computer Science, page 150-157. Springer, (2003)Cocyclic Generalised Hadamard Matrices and Central Relative Difference Sets., and . Des. Codes Cryptogr., 15 (2): 187-200 (1998)Community Detection in Bipartite Networks Using Random Walks., , and . CompleNet, volume 549 of Studies in Computational Intelligence, page 157-165. Springer, (2014)Entropy of the Retina Template., , , , , , and . ICB, volume 5558 of Lecture Notes in Computer Science, page 1250-1259. Springer, (2009)Sequences from Cycles.. AAECC, volume 1719 of Lecture Notes in Computer Science, page 121-130. Springer, (1999)Diagram versus bundle equivalence for ℤt × ℤ22-cocyclic Hadamard matrices., , , , and . Bull. ICA, (2017)Entropy of Feature Point-Based Retina Templates., , and . ICPR, page 213-216. IEEE Computer Society, (2010)Guest editorial for the special issue on design theory., and . Cryptogr. Commun., 2 (2): 127-128 (2010)