Author of the publication

Security Considerations in Minutiae-Based Fuzzy Vaults.

, , and . IEEE Trans. Inf. Forensics Secur., 10 (5): 985-998 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyclotomy Primality Proving - Recent Developments.. ANTS, volume 1423 of Lecture Notes in Computer Science, page 95-110. Springer, (1998)Fast Generation of Provable Primes Using Search in Arithmetic Progressions.. CRYPTO, volume 839 of Lecture Notes in Computer Science, page 282-293. Springer, (1994)Improved Fingerprint Image Segmentation and Reconstruction of Low Quality Areas., , and . ICPR, page 1241-1244. IEEE Computer Society, (2010)The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack., , and . BIOSIG, volume P-155 of LNI, page 43-54. GI, (2009)A Primality Test Using Cyclotomic Extensions.. AAECC, volume 357 of Lecture Notes in Computer Science, page 310-323. Springer, (1988)Generic Efficient Arithmetic Algorithms for PAFFs (Processor Adequate Finite Fields) and Related Algebraic Structures (Extended Abstract)., and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 320-334. Springer, (2003)Fast convolutions meet Montgomery.. Math. Comput., 77 (262): 1199-1221 (2008)The Generalized Fermat Equation., , and . Open Problems in Mathematics, Springer, (2016)Elliptic Gauss sums and applications to point counting., and . J. Symb. Comput., 45 (8): 825-836 (2010)