@dblp

Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks.

, , , , , , and . Inf. Sci., (2016)

Links and resources

Tags