Author of the publication

Emotional Influences on Cryptographic Key Generation Systems using EEG signals.

, , , and . KES, volume 126 of Procedia Computer Science, page 703-712. Elsevier, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A VHDL Based Controller Design for Non-contact Temperature and Breathing Sensors Suitable for Crib., , and . BIBE, page 126-133. IEEE Computer Society, (2014)New background modeling for speaker verification.. INTERSPEECH, ISCA, (2004)Ownership protection of outsourced biomedical time series data based on optimal watermarking scheme in data mining., , and . Australasian J. of Inf. Systems, (2017)A study on the stability of EEG signals for user authentication., , , , and . NER, page 122-125. IEEE, (2015)Testing Voice Mimicry with the YOHO Speaker Verification Corpus., , and . KES (4), volume 3684 of Lecture Notes in Computer Science, page 15-21. Springer, (2005)Fuzzy C-Means Clustering-Based Speaker Verification., and . AFSS, volume 2275 of Lecture Notes in Computer Science, page 318-324. Springer, (2002)Password Entropy and Password Quality., , , and . NSS, page 583-587. IEEE Computer Society, (2010)Novel Convex Active Contour Model Using Local and Global Information., , , , and . DICTA, page 346-351. IEEE Computer Society, (2011)Fuzzy Kernel Stochastic Gradient Descent machines., , , , , , and . IJCNN, page 3226-3232. IEEE, (2016)Fuzzy entropy semi-supervised support vector data description., , , , and . IJCNN, page 1-5. IEEE, (2013)