Author of the publication

High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia.

, , , , and . Soft Comput., 20 (12): 4907-4918 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The dark side of smartphone usage: Psychological traits, compulsive behavior and technostress., , , and . Computers in Human Behavior, (2014)A Comparative Study on Snow Cover Monitoring of Different Spatial Resolution Remote Sensing Images., , , , , and . IGARSS (2), page 567-570. IEEE, (2009)Analysis of the information theoretically secret key agreement by public discussion., , , , , and . Security and Communication Networks, 8 (15): 2507-2523 (2015)Fast Scalar Multiplications on the Curve v2 = up - au - b over the Finite Field of Characteristic p., , , and . Fundam. Inform., 129 (4): 395-412 (2014)Security Enhancement for Data Migration in the Cloud., , and . Future Internet, 9 (3): 23 (2017)Helpful-stressful cycle? Psychological links between type of mobile phone user and stress., , , and . Behaviour & IT, 35 (1): 75-86 (2016)Secure Biometric Authentication Scheme Based on Chaotic Map., and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 643-653. Springer, (2018)Models for estimating Leaf Area Index of different crops using hyperspectral data., , , , , , , , and . IGARSS, page 3283-3286. IEEE, (2010)A Multipath Payment Scheme Supporting Proof of Payment., and . Wirel. Commun. Mob. Comput., (2022)A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge., , , and . IJDSN, (2015)