Filter your results
- 3
- 3
- 3
- 3
- 4
- 2
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.85-94, ⟨10.1007/978-3-642-40779-6_6⟩
Conference papers
hal-01492835v1
|
||
|
Trustworthy Software Development14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.233-247, ⟨10.1007/978-3-642-40779-6_23⟩
Conference papers
hal-01492828v1
|
||
|
Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.204-206, ⟨10.1007/978-3-642-40779-6_19⟩
Conference papers
hal-01492823v1
|