Author of the publication

Research involving women and health in the Medline database, 1965-2005: co-term analysis and visualization of main lines of research.

, , , and . Scientometrics, 88 (3): 679-706 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research involving women and health in the Medline database, 1965-2005: co-term analysis and visualization of main lines of research., , , and . Scientometrics, 88 (3): 679-706 (2011)Stress detection by means of stress physiological template., , , and . NaBIC, page 131-136. IEEE, (2011)Architectures to Implement In-Air Signature Mobile Authentication to Increase the Security of E-Commerce Applications and Opinion of End Users., , , , and . DEIS, volume 194 of Communications in Computer and Information Science, page 478-492. Springer, (2011)A comparison of the standardized versions of ECIES., , , and . IAS, page 1-4. IEEE, (2010)A Stress-Detection System Based on Physiological Signals and Fuzzy Logic., , , and . IEEE Trans. Industrial Electronics, 58 (10): 4857-4865 (2011)Score optimization and template updating in a biometric technique for authentication in mobiles based on gestures., , , and . Journal of Systems and Software, 84 (11): 2013-2021 (2011)Invariant Hand Biometrics Feature Extraction., , , and . CCBR, volume 7098 of Lecture Notes in Computer Science, page 108-115. Springer, (2011)A Comparative Evaluation of Gaussian Multiscale Aggregation for Hand Biometrics., , , and . ICETE (Selected Papers), volume 314 of Communications in Computer and Information Science, page 388-399. Springer, (2011)Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite Fields., , and . CISIS, volume 6694 of Lecture Notes in Computer Science, page 160-167. Springer, (2011)Authentication in mobile devices through hand gesture recognition., , , and . Int. J. Inf. Sec., 11 (2): 65-83 (2012)