From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Host-based intrusion detection system for secure human-centric computing., , и . J. Supercomput., 72 (7): 2520-2536 (2016)A Fingerprint Matching Algorithm Using Image Recognition and Fuzzy Control., , , и . IC-AI, стр. 135-138. CSREA Press, (2002)Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault., , и . J. Inf. Sci. Eng., 25 (4): 1177-1190 (2009)Secure fuzzy fingerprint vault against correlation attack., , , , и . IEICE Electron. Express, 6 (18): 1368-1373 (2009)Configurable fuzzy fingerprint vault for Match-on-Card system., , и . IEICE Electron. Express, 6 (14): 993-999 (2009)MTD-Spamguard: a moving target defense-based spammer detection system in social network., , , и . Soft Comput., 22 (20): 6683-6691 (2018)A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication., , , и . CIS, том 4456 из Lecture Notes in Computer Science, стр. 605-615. Springer, (2006)Capacity Planning for Scalable Fingerprint Authentication., , , и . KES (1), том 4251 из Lecture Notes in Computer Science, стр. 906-915. Springer, (2006)A Hardware Implementation of Fingerprint Verification for Secure Biometric Authentication Systems., , , , и . ICIAR (2), том 3212 из Lecture Notes in Computer Science, стр. 770-777. Springer, (2004)Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors., , , и . ICIAR, том 3656 из Lecture Notes in Computer Science, стр. 1106-1117. Springer, (2005)