Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Open code biometric tap pad for smartphones., , and . J. Inf. Secur. Appl., (2021)Movement Pattern Based Authentication for Smart Mobile Devices., , and . ICMLA, page 1054-1058. IEEE, (2018)A Game Theoretic Analysis of the Twitter Follow-Unfollow Mechanism., , , and . GameSec, volume 11199 of Lecture Notes in Computer Science, page 265-276. Springer, (2018)An Enhanced Architecture for Serial Fusion based Multi-biometric Verification System., , and . ISNCC, page 1-6. IEEE, (2018)Authorship categorization of public domain literature., , and . UEMCON, page 1-7. IEEE, (2016)An Empirical Study on Verifier Order Selection in Serial Fusion Based Multi-biometric Verification System., and . IEA/AIE (1), volume 10350 of Lecture Notes in Computer Science, page 249-258. Springer, (2017)Continuous User Verification via Mouse Activities., , , and . MCSS, volume 566 of Communications in Computer and Information Science, page 170-181. Springer, (2015)Video Image Clustering Based on Human Face and Shirt Color., , , , and . Int. J. Image Graph., 10 (1): 1-19 (2010)A simple and efficient video image clustering algorithm for person specific query and image retrieval., , , and . ICIMCS, page 85-89. ACM, (2009)New impostor score based rejection methods for continuous keystroke verification with weak templates., , and . BTAS, page 251-258. IEEE, (2012)