Search for persons
X
?
2023 IEEE International Conference on Omni-layer Intelligent Systems (COINS) ,
4
Use Case Examples of Ethereum Non-Fungible Tokens Tied to A..:
, In:
?
Proceedings of the 28th Annual International Conference on Mobile Computing And Networking ,
6
A facial authentication system using post-quantum-secure da..:
, In:
?
Attacks and Defenses for the Internet-of-Things; Lecture Notes in Computer Science ,
9
Post-quantum Secure Communication with IoT Devices Using Ky..:
, In:
?
2022 International Conference of the Biometrics Special Interest Group (BIOSIG) ,
10
A Quantum-Resistant Face Template Protection Scheme using K..:
, In:
?
2020 32nd International Conference on Microelectronics (ICM) ,
13
Hardware Security for eXtended Merkle Signature Scheme Usin..:
, In:
?
2020 XIV Technologies Applied to Electronics Teaching Conference (TAEE) ,
14
How to Implement a Fingerprint Recognition Algorithm into a..:
, In:
?
2020 XIV Technologies Applied to Electronics Teaching Conference (TAEE) ,
15