Author:
Grzenda Maciej,Furtak Janusz,Legierski Jarosław,Awad Ali Ismail
Publisher
Springer International Publishing
Reference54 articles.
1. King, J., Awad, A.I.: A distributed security mechanism for resource-constrained IoT devices. Informatica (Slovenia) 40(1), 133–143 (2016)
2. Jain, A.K., Ross, A.A., Nandakumar, K.: Introduction to Biometrics. Springer (2011)
3. Awad, A.I., Baba, K.: Evaluation of a fingerprint identification algorithm with SIFT features. In: Proceedings of the 3rd 2012 IIAI International Conference on Advanced Applied Informatics, pp. 129–132. IEEE, Fukuoka, Japan (2012)
4. Egawa, S., Awad, A.I., Baba, K.: Evaluation of acceleration algorithm for biometric identification. In: Benlamri, R. (ed.) Networked Digital Technologies, Communications in Computer and Information Science, vol. 294, pp. 231–242. Springer, Berlin (2012)
5. Awad, A.I., Hassanien, A.E.: Impact of some biometric modalities on forensic science. In: Muda, A.K., Choo, Y.H., Abraham, A.N., Srihari, S. (eds.) Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, Studies in Computational Intelligence, vol. 555, pp. 47–62. Springer International Publishing (2014)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献