Author of the publication

Authentication System Using Encrypted Discrete Biometrics Data.

, , , , , and . TRUST, volume 8564 of Lecture Notes in Computer Science, page 210-211. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Effect of Points Dispersion on the k-nn Search in Random Projection Forests., , , and . IEEE Access, (2022)Approximate spectral clustering density-based similarity for noisy datasets., and . CoRR, (2023)Exploratory Geospatial Analysis Using GeoVISTA Studio: From a Desktop to the Web., and . WISE (2), page 92-101. IEEE Computer Society, (2001)0-7695-1393-X.Out-of-Order Execution for Avoiding Head-of-Line Blocking in Remote 3D Graphics., and . PSIVT, volume 4872 of Lecture Notes in Computer Science, page 62-74. Springer, (2007)Free-form three dimensional object recognition using artificial neural networks.. Monash University, Australia, (1996)Visualizing multivariate network on the surface of a sphere., and . APVIS, volume 60 of CRPIT, page 77-83. Australian Computer Society, (2006)ViCAT: Visualisation and Interaction on a Collaborative Access Table., , , , , , , , and . Tabletop, page 59-62. IEEE Computer Society, (2006)The Geodesic Self-Organizing Map and Its Error Analysis., and . ACSC, volume 38 of CRPIT, page 343-352. Australian Computer Society, (2005)Inclusion Tree Layout Convention : An Empirical Investigation., and . InVis.au, volume 24 of CRPIT, page 27-35. Australian Computer Society, (2003)Real-time 3D Finger Pointing for an Augmented Desk., and . AUIC, volume 40 of CRPIT, page 99-108. Australian Computer Society, (2005)