Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure one-time biometrie tokens for non-repudiable multi-party transactions., , , and . WIFS, page 1-6. IEEE, (2017)Security Issues, System Design.. Encyclopedia of Biometrics, Springer US, (2015)Decentralized Privacy-Preserving Netting Protocol on Blockchain for Payment Systems., , , , , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 137-155. Springer, (2020)Score normalization in multimodal biometric systems., , and . Pattern Recognit., 38 (12): 2270-2285 (2005)Biometric Template Security., , and . EURASIP J. Adv. Signal Process., (2008)Fusion in Multibiometric Identification Systems: What about the Missing Data?., , and . ICB, volume 5558 of Lecture Notes in Computer Science, page 743-752. Springer, (2009)Hardening Fingerprint Fuzzy Vault Using Password., , and . ICB, volume 4642 of Lecture Notes in Computer Science, page 927-937. Springer, (2007)Self-Ensembling Vision Transformer (SEViT) for Robust Medical Image Classification., , and . MICCAI (3), volume 13433 of Lecture Notes in Computer Science, page 376-386. Springer, (2022)Byzantine-Tolerant Methods for Distributed Variational Inequalities., , , , , , and . CoRR, (2023)Discovering Spatial Relationships by Transformers for Domain Generalization., and . CoRR, (2021)