Author of the publication

Biometrics Information Protection Using Fuzzy Vault Scheme.

, , , and . SITIS, page 124-128. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks., , and . IEICE Trans. Inf. Syst., 101-D (11): 2706-2709 (2018)Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault., , and . J. Inf. Sci. Eng., 25 (4): 1177-1190 (2009)MTD-Spamguard: a moving target defense-based spammer detection system in social network., , , and . Soft Comput., 22 (20): 6683-6691 (2018)A Fingerprint Matching Algorithm Using Image Recognition and Fuzzy Control., , , and . IC-AI, page 135-138. CSREA Press, (2002)Host-based intrusion detection system for secure human-centric computing., , and . J. Supercomput., 72 (7): 2520-2536 (2016)Configurable fuzzy fingerprint vault for Match-on-Card system., , and . IEICE Electron. Express, 6 (14): 993-999 (2009)A fingerprint matching hardware for smart cards., , , and . IEICE Electron. Express, 5 (4): 136-144 (2008)Secure fuzzy fingerprint vault against correlation attack., , , , and . IEICE Electron. Express, 6 (18): 1368-1373 (2009)A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication., , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 605-615. Springer, (2006)A Hardware Implementation of Fingerprint Verification for Secure Biometric Authentication Systems., , , , and . ICIAR (2), volume 3212 of Lecture Notes in Computer Science, page 770-777. Springer, (2004)