Author of the publication

Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model.

, , , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 833-838. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An ultra-low memory fingerprint matching algorithm and its implementation on a 32-bit smart card., , , , and . IEEE Trans. Consumer Electronics, 49 (2): 453-459 (2003)A practical implementation of fuzzy fingerprint vault for smart cards., , , , and . J. Intell. Manuf., 25 (2): 293-302 (2014)Parallel Algorithms for Perceptual Grouping on Distributed Memory Machines., , and . J. Parallel Distributed Comput., 50 (1/2): 123-143 (1998)Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System., , , and . EURASIP J. Adv. Signal Process., (2009)Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model., , , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 833-838. Springer, (2004)A study on the digital watermarking technique for JPEG 2000., , , and . ICHIT, volume 321 of ACM International Conference Proceeding Series, page 95-101. ACM, (2009)Fingerprint Template Protection Using Fuzzy Vault., , , , , and . ICCSA (3), volume 4707 of Lecture Notes in Computer Science, page 1141-1151. Springer, (2007)Fast Pig Detection with a Top-View Camera under Various Illumination Conditions., , , , , and . Symmetry, 11 (2): 266 (2019)A Secure Fingerprint Authentication System on an Untrusted Computing Environment., , , and . TrustBus, volume 3592 of Lecture Notes in Computer Science, page 299-310. Springer, (2005)Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques., , , and . ICIC (3), volume 2 of Communications in Computer and Information Science, page 858-867. Springer, (2007)