Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting iris vulnerability to direct attacks based on quality related features., , , and . ICCST, page 1-6. IEEE, (2011)Divide, recombine and conquer: Syntactic patterns-reassembly algorithm applied to password guessing process., , and . ICCST, page 1-6. IEEE, (2017)Fingerprint Liveness Detection Based on Quality Measures., , , and . CoRR, (2022)Robustness of Signature Verification Systems to Imitators with Increasing Skills., , , , and . ICDAR, page 728-732. IEEE Computer Society, (2009)Improving the Enrollment in Dynamic Signature Verfication with Synthetic Samples., , , and . ICDAR, page 1295-1299. IEEE Computer Society, (2009)Mobile signature verification: feature robustness and performance comparison., , , and . IET Biom., 3 (4): 267-277 (2014)A probabilistic framework for improved password strength metrics., , and . ICCST, page 1-6. IEEE, (2014)Variable-length template protection based on homomorphic encryption with application to signature biometrics., , and . IWBF, page 1-6. IEEE, (2016)Iris liveness detection based on quality related features., , , and . ICB, page 271-276. IEEE, (2012)On the vulnerability of face verification systems to hill-climbing attacks., , , , and . Pattern Recognit., 43 (3): 1027-1038 (2010)