Author of the publication

Security Enhancement for Smartphone Using Biometrics in Cyber-Physical Systems.

, , , , and . Int. J. Distributed Sens. Networks, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fingerprint Matching Algorithm Using Image Recognition and Fuzzy Control., , , and . IC-AI, page 135-138. CSREA Press, (2002)A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks., , and . IEICE Trans. Inf. Syst., 101-D (11): 2706-2709 (2018)Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault., , and . J. Inf. Sci. Eng., 25 (4): 1177-1190 (2009)MTD-Spamguard: a moving target defense-based spammer detection system in social network., , , and . Soft Comput., 22 (20): 6683-6691 (2018)Capacity Planning for Scalable Fingerprint Authentication., , , and . KES (1), volume 4251 of Lecture Notes in Computer Science, page 906-915. Springer, (2006)A Hardware Implementation of Fingerprint Verification for Secure Biometric Authentication Systems., , , , and . ICIAR (2), volume 3212 of Lecture Notes in Computer Science, page 770-777. Springer, (2004)A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication., , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 605-615. Springer, (2006)Host-based intrusion detection system for secure human-centric computing., , and . J. Supercomput., 72 (7): 2520-2536 (2016)A fingerprint matching hardware for smart cards., , , and . IEICE Electron. Express, 5 (4): 136-144 (2008)Configurable fuzzy fingerprint vault for Match-on-Card system., , and . IEICE Electron. Express, 6 (14): 993-999 (2009)