Author of the publication

Variable-length template protection based on homomorphic encryption with application to signature biometrics.

, , and . IWBF, page 1-6. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accuracy evaluation of handwritten signature verification: Rethinking the random-skilled forgeries dichotomy., , and . IJCB, page 302-310. IEEE, (2017)An Efficient Super-Resolution Single Image Network using Sharpness Loss Metrics for Iris., , and . WIFS, page 1-6. IEEE, (2020)Introduction to Iris Presentation Attack Detection., , , and . Handbook of Biometric Anti-Spoofing, 2nd Ed., Springer, (2019)A Study of Hand-Crafted and Naturally Learned Features for Fingerprint Presentation Attack Detection., , , , , and . Handbook of Biometric Anti-Spoofing, 2nd Ed., Springer, (2019)Preserving privacy in speaker and speech characterisation., , , , , , , , , and 9 other author(s). Comput. Speech Lang., (2019)Multi-algorithm Benchmark for Fingerprint Presentation Attack Detection with Laser Speckle Contrast Imaging., , and . BIOSIG, volume P-296 of LNI, page 119-128. Gesellschaft für Informatik e.V., (2019)Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging., , , , and . BIOSIG, volume P-282 of LNI, page 1-6. GI / IEEE, (2018)When Facial Recognition Systems become Presentation Attack Detectors., , , and . BIOSIG, volume P-329 of LNI, page 309-316. IEEE / Gesellschaft für Informatik e.V., (2022)Variations of handwritten signatures with time: A sigma-lognormal analysis., , , , and . ICB, page 1-6. IEEE, (2013)Face verification put to test: A hill-climbing attack based on the uphill-simplex algorithm., , , and . ICB, page 40-45. IEEE, (2012)