Author of the publication

Security Enhancement for Smartphone Using Biometrics in Cyber-Physical Systems.

, , , , and . Int. J. Distributed Sens. Networks, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VLSI Architecture of the Fuzzy Fingerprint Vault System., , and . ANNPR, volume 5998 of Lecture Notes in Computer Science, page 252-258. Springer, (2010)Detection method of visible and invisible nipples on digital breast tomosynthesis., , , , , and . Medical Imaging: Image Processing, volume 9413 of SPIE Proceedings, page 94132O. SPIE, (2015)Drivers and inhibitors of SaaS adoption in Korea., , and . Int. J. Inf. Manag., 33 (3): 429-440 (2013)Improvement of Fingerprint Verification by Using the Similarity Distribution., and . ITCS, volume 253 of Lecture Notes in Electrical Engineering, page 203-211. Springer, (2013)Automatic lung segmentation for large-scale medical image management., , , , and . Multim. Tools Appl., 75 (23): 15347-15363 (2016)Four-joint motion data based posture classification for immersive postural correction system., , , , and . Multimedia Tools Appl., 76 (9): 11235-11249 (2017)Simplified false-positive reduction in computer-aided detection scheme of clustered microcalcifications in digital breast tomosynthesis., , , , , and . Medical Imaging: Computer-Aided Diagnosis, volume 9414 of SPIE Proceedings, page 941426. SPIE, (2015)A Study on the Korean Banknote Recognition Using RGB and UV Information., , and . FGIT-FGCN, volume 56 of Communications in Computer and Information Science, page 477-484. Springer, (2009)VLSI implementation of the fuzzy fingerprint vault system., , and . IEICE Electron. Express, 7 (13): 899-905 (2010)Intelligent video surveillance system using two-factor human information., , , , and . Telecommun. Syst., 52 (4): 2249-2257 (2013)