Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Privacy-Preserving in Fingerprint Templates Security Using Combinatorial Logic Circuits

    Biometric recognition is one of the most popular person authentication schemes than any other recognition approaches like password or token-based authentication method. Biometrics uses either physiological or ...

    R. Ashoka Rajan, P. Kumaran in Soft Computing for Security Applications (2022)

  2. No Access

    Chapter and Conference Paper

    Critical Aware Community Based Parallel Service Composition Model for Pervasive Computing Environment

    Service composition in pervasive computing environments is needed to provide best quality of service. Services need to be discovered at run time and composed together for best possible user scenarios. The need...

    P. Kumaran, R. Shriram in Advances in Parallel Distributed Computing (2011)