2 | -- | 17 | Qinghan Xiao, Diana Wilkinson, Malcolm Anderson. Using biometrics and active RFID to improve security and safety in mass casualty management |
18 | -- | 34 | Marina L. Gavrilova, Kushan Ahmadian. Dealing with biometric multi-dimensionality through chaotic neural network methodology |
35 | -- | 49 | Romain Giot, Christophe Rosenberger. A new soft biometric approach for keystroke dynamics based on gender recognition |
50 | -- | 60 | Hongtao Chen, Heng Zhao, Liaojun Pang, Jimin Liang, Jie Tian. Multi fuzzy vault based on secret sharing for deadlock restoration |
61 | -- | 71 | Lynne Norris-Jones. Biometric access control in the workplace: benefit or bind? |
72 | -- | 82 | L. Wang. Some issues of biometrics: technology intelligence, progress and challenges |
83 | -- | 91 | N. Tajunisha, V. Saravanan. An efficient unsupervised sample clustering for cancer datasets based on statistical model pre-processing |
92 | -- | 111 | Li-min Liu. ATPDI: a computational definition of fingerprint singular points |
112 | -- | 121 | Loris Nanni, Sheryl Brahnam, Alessandra Lumini. A user dependent multi-resolution approach for biometric data |
122 | -- | 137 | Rima Belguechi, Patrick Lacharme, Christophe Rosenberger. Enhancing the privacy of electronic passports |
138 | -- | 152 | Gérard Chollet, Patrick Perrot, Walid Karam, Chafic Mokbel, Sanjay Ganesh Kanade, Dijana Petrovska-Delacrétaz. Identities, forgeries and disguises |
153 | -- | 166 | Chitu Okoli, Kevin Carillo. The best of adaptive and predictive methodologies: open source software development, a balance between agility and discipline |