Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...

Communications and Multimedia Security. Advanced Techniques for Network and Data Protection, 2003, p.1-13
2003
Link zum Volltext

IEEE transactions on pattern analysis and machine intelligence, 2006-12, Vol.28 (12), p.1892-1901
2006

IEEE transactions on circuits and systems for video technology, 2006-06, Vol.16 (6), p.771-775
2006

2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, p.325-328
2016
Link zum Volltext

Computers & security, 2004-10, Vol.23 (7), p.606-614
2004
Link zum Volltext

Studies in health technology and informatics, 2000, Vol.77, p.1069
2000
Link zum Volltext

Eigenspace-Based Face Hashing
Biometric Authentication, 2004, p.195-199
2004
Link zum Volltext



Studies in health technology and informatics, 1999, Vol.68, p.582
1999
Link zum Volltext

Proceedings of the 8th International Conference on Computational Science and Technology, 2022, Vol.835, p.195-206
2022
Link zum Volltext


2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, p.686-689
2016
Link zum Volltext


2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017, p.1267-1272
2017
Link zum Volltext

Studies in health technology and informatics, 2000, Vol.77, p.663
2000
Link zum Volltext


2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2015, p.612-618
2015
Link zum Volltext

Communications and Multimedia Security. Advanced Techniques for Network and Data Protection, 2003, p.27-39
2003
Link zum Volltext

Communications and Multimedia Security. Advanced Techniques for Network and Data Protection, 2003, p.181-193
2003
Link zum Volltext

Communications and Multimedia Security. Advanced Techniques for Network and Data Protection, 2003, p.239-251
2003
Link zum Volltext

Studies in health technology and informatics, 2000, Vol.77, p.1051
2000
Link zum Volltext

Proceedings of the 7th International Conference on Security of Information and Networks, 2014, p.170-170
2014
Link zum Volltext

Studies in health technology and informatics, 1998, Vol.52 Pt 2, p.1282
1998
Link zum Volltext