Author of the publication

Privacy preserving evaluation of signal quality with application to ECG analysis.

, , and . WIFS, page 1-6. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SEMBA: SEcure multi-biometric authentication., , , and . CoRR, (2018)Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey., , , and . IEEE Commun. Surv. Tutorials, 25 (4): 2427-2455 (Fourthquarter 2023)X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices., , , , and . ACNS (1), volume 14583 of Lecture Notes in Computer Science, page 183-210. Springer, (2024)Toward secure and efficient attestation for highly dynamic swarms: poster., , , , and . WISEC, page 281-282. ACM, (2017)Lossless compression of encrypted grey-level and color images., and . EUSIPCO, page 1-5. IEEE, (2008)Private Computing with Garbled Circuits Applications Corner., and . IEEE Signal Process. Mag., 30 (2): 123-127 (2013)Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey., , , and . CoRR, (2022)Malware triage for early identification of Advanced Persistent Threat activities., , and . CoRR, (2018)General function evaluation in a STPC setting via piecewise linear approximation., , and . WIFS, page 55-60. IEEE, (2012)Privacy preserving evaluation of signal quality with application to ECG analysis., , and . WIFS, page 1-6. IEEE, (2010)