Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Call Center Customer Verification by Query-Directed Passwords., , and . Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, page 54-67. Springer, (2004)Efficient Multi-Band Temporal Video Filter for Reducing Human-Robot Interaction.. CoRR, (2024)Using Information Extraction for Quality Analysis in Human Authentication., , , and . HICSS, IEEE Computer Society, (2005)Basic Techniques and Symbol-Level Recognition - An Overview.. GREC, volume 1072 of Lecture Notes in Computer Science, page 1-12. Springer, (1995)How to Speak an Authentication Secret Securely from an Eavesdropper., , and . Security Protocols Workshop, volume 5087 of Lecture Notes in Computer Science, page 215-229. Springer, (2006)Comparing passwords, tokens, and biometrics for user authentication.. Proc. IEEE, 91 (12): 2021-2040 (2003)Video Analytics Gait Trend Measurement for Fall Prevention and Health Monitoring., , , and . ICPR, page 489-496. IEEE, (2020)Experimental comparisons of binarization and multi-thresholding methods on document images.. ICPR (2), page 395-398. IEEE, (1994)Electronic Marketing and Identification Techniques to Discourage Document Copying., , , and . INFOCOM, page 1278-1287. IEEE Computer Society, (1994)An analysis of feature detectability from curvature estimation.. CVPR, page 235-240. IEEE, (1988)