Author of the publication

Anwendung der TR-RESISCAN und TR-ESOR im Gesundheitswesen.

, , , , and . GI-Jahrestagung, volume P-208 of LNI, page 1635-1650. GI, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems., , , , , , and . BIOSIG, volume P-164 of LNI, page 45-56. GI, (2010)Efficient Database Techniques for Identification with Fuzzy Vault Templates., , , , , , , , and . BIOSIG, volume P-191 of LNI, page 115-126. GI, (2011)Rechtliche Rahmenbedingungen der elektronischen Rechnung., and . Sicherheit, volume P-77 of LNI, page 256-269. GI, (2006)Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien., , , , and . Sicherheit, volume P-170 of LNI, page 1-12. GI, (2010)Improved Fuzzy Vault Scheme for Alignment-Free Fingerprint Features., , , , , and . BIOSIG, volume P-245 of LNI, page 121-132. GI, (2015)Improvement of Fuzzy Vault for Multiple Fingerprints with Angles., , and . BIOSIG, volume P-260 of LNI, page 233-240. GI / IEEE, (2016)Multi-modal and multi-instance fusion for biometric cryptosystems., , and . BIOSIG, volume P-196 of LNI, page 1-6. GI, (2012)additionally published as volume P-196 in the "Lecture Notes in Informatics" (LNI) series.Correlation-resistant fuzzy vault for fingerprints., , , and . Sicherheit, volume P-256 of LNI, page 125-136. GI, (2016)Sichere Digitalisierung mit TR-RESISCAN und TR-ESOR., , and . Datenschutz und Datensicherheit, 43 (4): 203-208 (2019)Langfristige Beweissicherheit und Vertrauenswürdigkeit digitaler Unterlagen., , , and . Datenschutz und Datensicherheit, 46 (1): 32-39 (2022)