Author of the publication

Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien.

, , , , and . Sicherheit, volume P-170 of LNI, page 1-12. GI, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comprehensive Analysis of Privacy Leakage in Vertical Federated Learning During Prediction., , and . Proc. Priv. Enhancing Technol., 2022 (2): 263-281 (2022)DeepMemory: Model-based Memorization Analysis of Deep Neural Language Models., , , , , and . ASE, page 1003-1015. IEEE, (2021)Distributed GAN-Based Privacy-Preserving Publication of Vertically-Partitioned Data., , , and . Proc. Priv. Enhancing Technol., 2023 (2): 236-250 (April 2023)An Efficient 3D Facial Landmark Detection Algorithm with Haar-like Features and Anthropometric Constraints., and . BIOSIG, volume P-212 of LNI, page 345. GI, (2013)A Practical View of Privacy Preserving Biometric Authentication.. Sicherheit, volume P-195 of LNI, page 6. GI, (2012)Privacy enhancing technology for a 3D-face recognition system., , , , , and . BIOSIG, volume P-108 of LNI, page 3-14. GI, (2007)Multi-Sample Fusion with Template Protection., , , , and . BIOSIG, volume P-155 of LNI, page 55-67. GI, (2009)Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien., , , , and . Sicherheit, volume P-170 of LNI, page 1-12. GI, (2010)Perceptual Hashing of Video Content Based on Differential Block Similarity., , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 80-85. Springer, (2005)Template Protection for Biometric Gait Data., , and . BIOSIG, volume P-164 of LNI, page 73-81. GI, (2010)