Author of the publication

Breaking Free From Entropy's Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography.

, , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis., , and . IACR Cryptology ePrint Archive, (2012)Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis., , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 389-404. Springer, (2013)Cryptanalysis of the full CHAIN cipher., , and . IAS, page 40-45. IEEE, (2011)Breaking Free From Entropy's Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography., , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Construction of Optimal Stock Market Portfolios Using Outlier Detection Algorithm., , , and . SCDS, volume 1489 of Communications in Computer and Information Science, page 160-173. Springer, (2021)Convolutional Neural Network-Based Collaborative Filtering for Recommendation Systems., , and . RiTA, volume 1015 of Communications in Computer and Information Science, page 117-131. Springer, (2018)Performance Analysis of an Fuzzy Logic Based LEACH Protocol., , and . ICSCA, page 33-37. ACM, (2019)An improved preimage attack against HAVAL-3., , and . Inf. Process. Lett., 115 (2): 386-393 (2015)Study the Effect of Commonly Used Video Compression Techniques on Sound Recovery via Negligible Object Vibrations for Visual Surveillance System., , , , , , and . ICAIP, page 111-115. ACM, (2018)Cryptanalysis of a CP-ABE scheme with policy in normal forms., and . Inf. Process. Lett., 116 (7): 492-495 (2016)