Author of the publication

Extending identity management system with multimodal biometric authentication.

, , , and . Comput. Sci. Inf. Syst., 13 (2): 313-334 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Zwischen Forschung und Praxis: Fähigkeiten und Limitationen generativer KI sowie ihre wachsende Bedeutung in der Zukunft., , , , and . HMD Prax. Wirtsch., 61 (2): 344-370 (April 2024)Common web application attack types and security using ASP.NET., and . Comput. Sci. Inf. Syst., 3 (2): 83-96 (2006)Holistic approach to Wep protocol in securing wireless network infrastructure., and . Comput. Sci. Inf. Syst., 3 (2): 97-113 (2006)A Novel Approach to Building Secure Systems., and . ARES, page 1074-1084. IEEE Computer Society, (2007)A model of digital identity for better information security in e-learning systems., , and . J. Supercomput., 78 (3): 3325-3354 (2022)Designing Laboratory for IoT Communication Infrastructure Environment for Remote Maritime Surveillance in Equatorial Areas Based on the Gulf of Guinea Field Experiences., , , , , and . Sensors, 20 (5): 1349 (2020)Defense Strategies Against Modern Botnets, and . CoRR, (2009)Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment., and . Comput. Secur., (2019)Enhancing educational insights: A real-time data analytics stack for project-basedlearning., , , , and . GI-Jahrestagung, volume P-337 of LNI, page 1963-1971. Gesellschaft für Informatik, Bonn, (2023)A Holistic Approach to Securing Web Applications, and . CoRR, (2010)