From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Call Center Customer Verification by Query-Directed Passwords., , и . Financial Cryptography, том 3110 из Lecture Notes in Computer Science, стр. 54-67. Springer, (2004)Efficient Multi-Band Temporal Video Filter for Reducing Human-Robot Interaction.. CoRR, (2024)Using Information Extraction for Quality Analysis in Human Authentication., , , и . HICSS, IEEE Computer Society, (2005)Basic Techniques and Symbol-Level Recognition - An Overview.. GREC, том 1072 из Lecture Notes in Computer Science, стр. 1-12. Springer, (1995)How to Speak an Authentication Secret Securely from an Eavesdropper., , и . Security Protocols Workshop, том 5087 из Lecture Notes in Computer Science, стр. 215-229. Springer, (2006)Video Analytics Gait Trend Measurement for Fall Prevention and Health Monitoring., , , и . ICPR, стр. 489-496. IEEE, (2020)Comparing passwords, tokens, and biometrics for user authentication.. Proc. IEEE, 91 (12): 2021-2040 (2003)Electronic Marketing and Identification Techniques to Discourage Document Copying., , , и . INFOCOM, стр. 1278-1287. IEEE Computer Society, (1994)Experimental comparisons of binarization and multi-thresholding methods on document images.. ICPR (2), стр. 395-398. IEEE, (1994)Watermarking Document Images with Bounding Box Expansion., и . Information Hiding, том 1174 из Lecture Notes in Computer Science, стр. 227-235. Springer, (1996)