Author of the publication

Multivariate Statistical Analysis of Deformation Momenta Relating Anatomical Shape to Neuropsychological Measures.

, , , , , , , and . MICCAI (3), volume 6363 of Lecture Notes in Computer Science, page 529-537. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Welcome to the 90's: Let's Not Be the Last to Exploit GUI's., , and . Int. CMG Conference, page 923-933. Computer Measurement Group, (1992)Calculating Expected Reliability of Systems and Hardware.. Int. CMG Conference, page 335-340. Computer Measurement Group, (2005)Multivariate Statistical Analysis of Deformation Momenta Relating Anatomical Shape to Neuropsychological Measures., , , , , , , and . MICCAI (3), volume 6363 of Lecture Notes in Computer Science, page 529-537. Springer, (2010)A Key Distribution Method for Object-Based Protection., and . ACM Conference on Computer and Communications Security, page 193-197. ACM, (1994)On the Performance of Signature Schemes Based on Elliptic Curves., , , and . ANTS, volume 1423 of Lecture Notes in Computer Science, page 252-266. Springer, (1998)Exhaustive Key Search.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Parallel Collision Search with Cryptanalytic Applications., and . J. Cryptol., 12 (1): 1-28 (1999)A Secure Audio Teleconference System., , , and . CRYPTO, volume 403 of Lecture Notes in Computer Science, page 520-528. Springer, (1988)Bounds on Birthday Attack Times.. IACR Cryptology ePrint Archive, (2005)Exhaustive Key Search.. Encyclopedia of Cryptography and Security, Springer, (2005)