Author of the publication

Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication.

. EuroISI, volume 5376 of Lecture Notes in Computer Science, page 143-154. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Signature-Based Approach for Intrusion Detection.. MLDM, volume 3587 of Lecture Notes in Computer Science, page 526-536. Springer, (2005)A Theoretical Foundation and a Method for Document Table Structure Extraction and Decompositon., , , , and . Document Analysis Systems, volume 2423 of Lecture Notes in Computer Science, page 291-294. Springer, (2002)SIPPA-2.0 - Secure information processing with privacy assurance (version 2.0)., , and . PST, page 25-34. IEEE Computer Society, (2012)Integrating uncertain speech evidence into a knowledge-based message generation system for the nonverbal, severely motor disabled., and . ICASSP, page 2496-2499. IEEE, (1988)Personal Assistant: A Case Study on Web Service vs. Web Based Application., , and . International Conference on Internet Computing, page 853-858. CSREA Press, (2004)A knowledge-based message generation system for the nonverbal, profoundly motor disabled., and . FJCC, page 644-651. ACM, (1987)Integrating Multimedia Techniques into CS Pedagogy., , , , and . WebNet, page 63-68. AACE, (1999)An uncertainty-based software testing model using test universe partitions (abstract)., and . ACM Conference on Computer Science, page 408. ACM, (1986)Privacy Preserving Biometric Voice Authentication System - SIPPA-based Approach.. ICSEng, volume 366 of Advances in Intelligent Systems and Computing, page 509-514. Springer, (2014)Data Mining Approach Based on Information-Statistical Analysis: Application to Temporal-Spatial Data., and . MLDM, volume 2123 of Lecture Notes in Computer Science, page 128-140. Springer, (2001)