Author of the publication

Architectures for efficient face authentication in embedded systems.

, , , and . DATE Designers' Forum, page 1-6. European Design and Automation Association, Leuven, Belgium, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems Based on Machine Learning., , , and . IEEE Trans. Emerg. Top. Comput., 10 (2): 870-885 (2022)Analysis and design of a hardware/software trusted platform module for embedded systems., , and . ACM Trans. Embed. Comput. Syst., 8 (1): 8:1-8:31 (2008)MILP-aided Cryptanalysis of Round Reduced ChaCha., , and . IACR Cryptology ePrint Archive, (2017)Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices., , , , , and . CAMAD, page 173-178. IEEE, (2022)Neighbor stranger discrimination: a new defense mechanism against Internet DDOS attacks., , , and . AICCSA, page 95. IEEE Computer Society, (2005)Secure Multi-Party Computation-Based Privacy-Preserving Authentication for Smart Cities., , , , and . IEEE Trans. Cloud Comput., 11 (4): 3555-3572 (October 2023)Hybrid Architectures for Efficient and Secure Face Authentication in Embedded Systems., , , and . IEEE Trans. Very Large Scale Integr. Syst., 15 (3): 296-308 (2007)Dynamic Binary Instrumentation-Based Framework for Malware Defense., , and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 64-87. Springer, (2008)Finding and Evaluating Parameters for BGV., , , , and . AFRICACRYPT, volume 14064 of Lecture Notes in Computer Science, page 370-394. Springer, (2023)ML-FEED: Machine Learning Framework for Efficient Exploit Detection (Extended version)., , , , and . CoRR, (2023)