Author of the publication

A Survey of Automatic Facial Micro-expression Analysis: Databases, Methods and Challenges.

, , , , and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Models for Heterogeneous Networking., , , and . SECRYPT, page 318-321. SciTePress, (2010)Further attacks and comments on 'security of two remote user authentication schemes using smart cards'., and . IEEE Trans. Consumer Electronics, 50 (2): 609-611 (2004)On the security of the WinRAR encryption feature., and . Int. J. Inf. Sec., 5 (2): 115-123 (2006)Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme., and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 33-39. (2005)Cryptanalysis of some improved password-authenticated key exchange schemes., , and . Computer Communications, 29 (15): 2822-2829 (2006)Sparsity in Dynamics of Spontaneous Subtle Emotions: Analysis & Application., , and . CoRR, (2016)Cryptanalysis of the application secure alternative to SNMP (APSSNMP).. Computer Standards & Interfaces, 31 (1): 63-65 (2009)Cryptanalysis of e-mail protocols providing perfect forward secrecy.. Computer Standards & Interfaces, 30 (3): 101-105 (2008)On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor., and . ISC, volume 3225 of Lecture Notes in Computer Science, page 111-122. Springer, (2004)Related-Key Attacks on Triple-DES and DESX Variants.. CT-RSA, volume 2964 of Lecture Notes in Computer Science, page 15-24. Springer, (2004)