What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ajay Kumar
Google Scholar
ORCID:
0000-0002-3761-2436
20
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/tifs
Finger-Knuckle Assisted Slap Fingerprint Identification System for Higher Security and Convenience.
Zhenyu Zhou
Ajay Kumar
2023
journals/tifs
Detecting Locally, Patching Globally: An End-to-End Framework for High Speed and Accurate Detection of Fingerprint Minutiae.
Yulin Feng
Ajay Kumar
2021
journals/tifs
Minutiae Attention Network With Reciprocal Distance Loss for Contactless to Contact-Based Fingerprint Identification.
Hanzhuo Tan
Ajay Kumar
2021
journals/tifs
Deep Feature Collaboration for Challenging 3D Finger Knuckle Identification.
Kevin H. M. Cheng
Ajay Kumar
2021
journals/tifs
Periocular-Assisted Multi-Feature Collaboration for Dynamic Iris Recognition.
Kuo Wang
Ajay Kumar
2020
journals/tifs
Towards More Accurate Contactless Fingerprint Minutiae Extraction and Pose-Invariant Matching.
Hanzhuo Tan
Ajay Kumar
2019
journals/tifs
A CNN-Based Framework for Comparison of Contactless to Contact-Based Fingerprints.
Chenhao Lin
Ajay Kumar
2019
journals/tifs
Toward More Accurate Iris Recognition Using Dilated Residual Features.
Kuo Wang
Ajay Kumar
2019
journals/tifs
Toward More Accurate Matching of Contactless Palmprint Images Under Less Constrained Environments.
Ajay Kumar
2018
journals/tifs
Improving Periocular Recognition by Explicit Attention to Critical Regions in Deep Neural Network.
Zijing Zhao
Ajay Kumar
2017
journals/tifs
Accurate Periocular Recognition Under Less Constrained Environment Using Semantics-Assisted Convolutional Neural Network.
Zijing Zhao
Ajay Kumar
2016
journals/tifs
Suspecting Less and Doing Better: New Insights on Palmprint Identification for Faster and More Accurate Matching.
Qian Zheng
Ajay Kumar
Gang Pan
2016
journals/tifs
Personal Identification Using Minor Knuckle Patterns From Palm Dorsal Surface.
Ajay Kumar
Zhihuan Xu
2014
journals/tifs
Efficient and Accurate At-a-Distance Iris Recognition Using Geometric Key-Based Iris Encoding.
Chun-Wei Tan
Ajay Kumar
2014
journals/tifs
Importance of Being Unique From Finger Dorsal Patterns: Exploring Minor Finger Knuckle Patterns in Verifying Human Identities.
Ajay Kumar
2011
journals/tifs
Human Identification Using Palm-Vein Images.
Yingbo Zhou
Ajay Kumar
2011
journals/tifs
A Unified Framework for Contactless Hand Verification.
Vivek Kanhangad
Ajay Kumar
David Zhang
2010
journals/tifs
A new framework for adaptive multimodal biometrics management.
Ajay Kumar
Vivek Kanhangad
David Zhang
2009
journals/tifs
Personal authentication using finger knuckle surface.
Ajay Kumar
Ch. Ravikanth
2007
journals/tifs
Hand-Geometry Recognition Using Entropy-Based Discretization.
Ajay Kumar
David Zhang
Coauthors
Ajay Kumar
(20)
Ch. Ravikanth
(1)
Chenhao Lin
(1)
Chun-Wei Tan
(1)
David Zhang
(3)
Gang Pan
(1)
Hanzhuo Tan
(2)
Kevin H. M. Cheng
(1)
Kuo Wang
(2)
Qian Zheng
(1)
Vivek Kanhangad
(2)
Yingbo Zhou
(1)
Yulin Feng
(1)
Zhenyu Zhou
(1)
Zhihuan Xu
(1)
Zijing Zhao
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to