Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EvaBio a New Modular Platform to Evaluate Biometric System., , , , , and . ICISSP (Revised Selected Papers), volume 576 of Communications in Computer and Information Science, page 234-250. Springer, (2015)A review on the public benchmark databases for static keystroke dynamics., , and . Comput. Secur., (2015)Challenge-based speaker recognition for mobile authentication., , and . BIOSIG, volume P-196 of LNI, page 1-7. GI, (2012)additionally published as volume P-196 in the "Lecture Notes in Informatics" (LNI) series.When my Behavior Enhances my Smartphone Security., , and . CW, page 280-284. IEEE, (2020)Capture Biases in Fingerprint Systems., , , and . CW, page 350-356. IEEE, (2023)Digital fingerprint indexing using synthetic binary indexes., , and . Pattern Anal. Appl., 27 (2): 57 (June 2024)An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates., , , and . Comput. Secur., (2013)Unconstrained keystroke dynamics authentication with shared secret., , , and . Comput. Secur., 30 (6-7): 427-445 (2011)Analysis of the acquisition process for keystroke dynamics., , , and . BIOSIG, volume P-196 of LNI, page 1-6. GI, (2012)additionally published as volume P-196 in the "Lecture Notes in Informatics" (LNI) series.How Artificial Intelligence can be used for Behavioral Identification?, , , and . CW, page 246-253. IEEE, (2021)