Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capacity investigation of on-off keying in noncoherent channel settings at low SNR., , and . Trans. Emerging Telecommunications Technologies, 26 (11): 1235-1250 (2015)Square Root approximation to the Poisson Channel., , and . ISIT, page 1695-1699. IEEE, (2013)Secret rate - Privacy leakage in biometric systems., and . ISIT, page 2251-2255. IEEE, (2009)Authentication based on secret-key generation., and . ISIT, page 1792-1796. IEEE, (2012)Privacy-leakage codes for biometric authentication systems., and . ICASSP, page 1601-1605. IEEE, (2014)Information leakage in fuzzy commitment schemes., and . IEEE Trans. Information Forensics and Security, 5 (2): 337-348 (2010)Biometric systems: privacy and secrecy aspects., and . IEEE Trans. Information Forensics and Security, 4 (4): 956-973 (2009)Coding for a binary independent piecewise-identically-distributed source.. IEEE Trans. Information Theory, 42 (6): 2210-2217 (1996)Context weighting for general finite-context sources., , and . IEEE Trans. Information Theory, 42 (5): 1514-1520 (1996)A universal variable-to-fixed length source code based on Lawrence's algorithm., and . IEEE Trans. Information Theory, 38 (2): 247-253 (1992)