Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BioSAKE: Biometrics-based secure authentication and key exchange.. ICB, page 1-8. IEEE, (2013)Blockchain: From Technology to Marketplaces., , , , and . Computer, 53 (7): 14-18 (2020)FeSViBS: Federated Split Learning of Vision Transformer with Block Sampling., , , and . MICCAI (2), volume 14221 of Lecture Notes in Computer Science, page 350-360. Springer, (2023)A Unified Model for Face Matching and Presentation Attack Detection using an Ensemble of Vision Transformer Features., and . WACV (Workshops), page 662-671. IEEE, (2023)PPDL - Privacy Preserving Deep Learning Using Homomorphic Encryption., , , , and . COMAD/CODS, page 318-319. ACM, (2022)Optimizing Homomorphic Encryption based Secure Image Analytics., , , , and . MMSP, page 1-6. IEEE, (2021)Evading Forensic Classifiers with Attribute-Conditioned Adversarial Faces., , and . CVPR, page 16469-16478. IEEE, (2023)Fusion in Multibiometric Identification Systems: What about the Missing Data?., , and . ICB, volume 5558 of Lecture Notes in Computer Science, page 743-752. Springer, (2009)Hardening Fingerprint Fuzzy Vault Using Password., , and . ICB, volume 4642 of Lecture Notes in Computer Science, page 927-937. Springer, (2007)Secure one-time biometrie tokens for non-repudiable multi-party transactions., , , and . WIFS, page 1-6. IEEE, (2017)