Author of the publication

Secure Biometric Authentication with Improved Accuracy.

, , , and . ACISP, volume 5107 of Lecture Notes in Computer Science, page 21-36. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tool-Assisted Specification and Verification of the JavaCard Platform., , , and . AMAST, volume 2422 of Lecture Notes in Computer Science, page 41-59. Springer, (2002)Jakarta: A Toolset for Reasoning about JavaCard., , , and . E-smart, volume 2140 of Lecture Notes in Computer Science, page 2-18. Springer, (2001)A tool for implementing privacy in Nano., , and . DAPPS, page 159-163. IEEE, (2020)A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction., , , and . PADL, volume 7752 of Lecture Notes in Computer Science, page 43-59. Springer, (2013)Deciding Kleene algebra terms equivalence in Coq., , and . J. Log. Algebraic Methods Program., 84 (3): 377-401 (2015)Learning Stochastic Timed Automata from Sample Executions., , and . ISoLA (1), volume 7609 of Lecture Notes in Computer Science, page 508-523. Springer, (2012)Partial Derivative Automata Formalized in Coq., , , and . CIAA, volume 6482 of Lecture Notes in Computer Science, page 59-68. Springer, (2010)A Formal Correspondence between Offensive and Defensive JavaCard Virtual Machines., , , and . VMCAI, volume 2294 of Lecture Notes in Computer Science, page 32-45. Springer, (2002)E-Id Authentication and Uniform Access to Cloud Storage Service Providers., , , and . CloudCom (1), page 487-492. IEEE Computer Society, (2013)IS 2006 PC Co-chairs' Message., , and . OTM Workshops (1), volume 4277 of Lecture Notes in Computer Science, page 311. Springer, (2006)