Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eigen-Model Projections for Protected On-line Signature Recognition., , , and . BIOID, volume 6583 of Lecture Notes in Computer Science, page 49-60. Springer, (2011)Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions., , and . CoRR, (2018)Online Signature Verification Based on Generative Models., and . IEEE Trans. Syst. Man Cybern. Part B, 42 (4): 1231-1242 (2012)Biometric Template Protection Using Universal Background Models: An Application to Online Signature., , , and . IEEE Trans. Inf. Forensics Secur., 7 (1): 269-282 (2012)Gradiant asymmetric encryption and verification systems based on handwritten signature., , and . ACM Conference on Computer and Communications Security, page 1349-1350. ACM, (2013)Discriminative training of spiking neural networks organised in columns for stream-based biometric authentication., , , and . IET Biom., 11 (5): 485-497 (September 2022)Comments on a recently proposed Privacy Preserving Lightweight Biometric Authentication System for IoT Security., and . CoRR, (2019)On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication., , , and . IEEE Trans. Inf. Forensics Secur., (2021)Development and Implementation of a Biometric Verification System for E-learning Platforms., , , and . EDUTECH, volume 151 of IFIP, page 155-164. Kluwer/Springer, (2004)Modeling magnitudes of Gabor coefficients: The beta-Rayleigh distribution., , , and . ICIP, page 1245-1248. IEEE, (2009)