From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A realtime, memory efficient fingerprint verification system., и . ICASSP (5), стр. 189-192. IEEE, (2004)Automatic secure fingerprint verification system based on fuzzy vault scheme., и . ICASSP (5), стр. 609-612. IEEE, (2005)A secure fingerprint matching technique., и . WBMA@MM, стр. 89-94. ACM, (2003)Secure IRIS Verification., и . ICASSP (2), стр. 133-136. IEEE, (2007)Testing ThumbPod: Softcore bugs are hard to find., , , , , , , и . HLDVT, стр. 77-82. IEEE Computer Society, (2003)Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system., , , , , , , и . DAC, стр. 60-65. ACM, (2003)A side-channel leakage free coprocessor IC in 0.18µm CMOS for embedded AES-based cryptographic and biometric processing., , , , , , и . DAC, стр. 222-227. ACM, (2005)Microcoded coprocessor for embedded secure biometric authentication systems., , и . CODES+ISSS, стр. 130-135. ACM, (2005)Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment., , , , , , и . CHES, том 3659 из Lecture Notes in Computer Science, стр. 354-365. Springer, (2005)Multilevel design validation in a secure embedded system., , , и . HLDVT, стр. 203-210. IEEE Computer Society, (2005)