Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical part detection with deep neural networks., , , , and . ICIP, page 1933-1937. IEEE, (2016)Single- and cross- database benchmarks for gender classification under unconstrained settings., , , and . ICCV Workshops, page 2152-2159. IEEE Computer Society, (2011)Improved average of synthetic exact filters for precise eye localisation under realistic conditions., , and . IET Biom., 2 (1): 10-20 (2013)Efficient Partially Blind Signature from LFSR., , and . SNPD (2), page 717-722. IEEE Computer Society, (2007)Non-invasive imaging of ventricular activation during pacing and arrhythmia: Methods and validation., , and . EMBC, page 113-116. IEEE, (2016)Fuzzy certificateless signature., , , , and . Security and Communication Networks, 9 (16): 3658-3669 (2016)Certificateless threshold cryptosystem secure against chosen-ciphertext attack., and . Inf. Sci., 177 (24): 5620-5637 (2007)Restrictive partially blind signature for resource-constrained information systems., , , , and . Knowl. Inf. Syst., 26 (1): 87-103 (2011)Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism., and . Inf. Sci., 180 (7): 1167-1181 (2010)Practical Certificateless Aggregate Signatures from Bilinear Maps., , , and . J. Inf. Sci. Eng., 26 (6): 2093-2106 (2010)