Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Requirements in Identity Management Solutions., , , and . HCI (9), volume 4558 of Lecture Notes in Computer Science, page 694-702. Springer, (2007)Sparse point cloud registration and aggregation with mesh-based generalized iterative closest point., , , and . J. Field Robotics, 38 (8): 1078-1091 (2021)Privacy preserving multi-factor authentication with biometrics., , , , , and . J. Comput. Secur., 15 (5): 529-560 (2007)From RNA-seq reads to differential expression results, and . (2010)Loss of Significance and Its Effect on Point Normal Orientation and Cloud Registration., , , , and . Remote. Sens., 11 (11): 1329 (2019)DARTS: DenseUnet-based Automatic Rapid Tool for brain Segmentation., , , , , , , , and . CoRR, (2019)Development of an autonomous robotic system for terrain mapping., , , , and . M2VIP, page 1-6. IEEE, (2017)Standards for Biometric Data Protection., and . Security and Privacy in Biometrics, Springer, (2013)Electric Sheep Team Description Paper Humanoid League Kid-Size 2019., , , , , , and . CoRR, (2019)Image Quality and Performance Based on Henry Classification and Finger Location., and . AutoID, page 51-56. IEEE, (2007)