From post

An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number.

, , и . ICBA, том 3072 из Lecture Notes in Computer Science, стр. 117-123. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection of Repetitive Forex Chart Patterns., , и . ICSI (2), том 10386 из Lecture Notes in Computer Science, стр. 395-402. Springer, (2017)An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number., , и . ICBA, том 3072 из Lecture Notes in Computer Science, стр. 117-123. Springer, (2004)Finalizing the reason of the inconsistency of fuzzy inference templates based on triangular fuzzy relational compositions: a generic case., , и . FUZZ-IEEE, стр. 110-115. IEEE, (2002)Comparing the Performance of Principal Component Analysis and RBF Network for Face Recognition using Locally Linear Embedding., , и . IASSE, стр. 78-82. ISCA, (2005)Automatic Digital Camera Based Fingerprint Image Preprocessing., , и . CGIV, стр. 182-189. IEEE Computer Society, (2006)Technical Indicators for Forex Forecasting: A Preliminary Study., , и . ICSI (3), том 9142 из Lecture Notes in Computer Science, стр. 87-97. Springer, (2015)Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and 2N Discretization., , и . EURASIP J. Adv. Signal Process., (2007)Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures., , , и . ICB, том 3832 из Lecture Notes in Computer Science, стр. 509-515. Springer, (2006)Bio-discretization: Biometrics Authentication Featuring Face Data and Tokenised Random Number., , и . Australian Conference on Artificial Intelligence, том 3339 из Lecture Notes in Computer Science, стр. 64-73. Springer, (2004)Flexibly Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage., , и . Communications and Multimedia Security, том 2828 из Lecture Notes in Computer Science, стр. 181-193. Springer, (2003)