273 | -- | 282 | Hong Zhao, Yun-Qing Shi. Detecting Covert Channels in Computer Networks Based on Chaos Theory |
283 | -- | 294 | Andrew Chi-Chih Yao, Yunlei Zhao. Online/Offline Signatures for Low-Power Devices |
295 | -- | 304 | Ngoc-Son Vu. Exploring Patterns of Gradient Orientations and Magnitudes for Face Recognition |
305 | -- | 313 | Qian Tao, Raymond N. J. Veldhuis. Robust Biometric Score Fusion by Naive Likelihood Ratio via Receiver Operating Characteristics |
314 | -- | 323 | Cristina Comaniciu, H. Vincent Poor. On Energy-Secrecy Trade-Offs for Gaussian Wiretap Channels |
324 | -- | 334 | Rafael F. Wyrembelski, Moritz Wiese, Holger Boche. Strong Secrecy in Bidirectional Broadcast Channels With Confidential Messages |
335 | -- | 349 | Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tubaro. Revealing the Traces of JPEG Compression Anti-Forensics |
350 | -- | 360 | Sheng Li, Alex C. Kot. Fingerprint Combination for Privacy Protection |
361 | -- | 373 | Jessica J. Fridrich. Effect of Cover Quantization on Steganographic Fisher Information |
374 | -- | 389 | Stefano Berretti, Alberto Del Bimbo, Pietro Pala. Sparse Matching of Salient Facial Curves for Recognition of 3-D Faces With Missing Parts |
390 | -- | 401 | Robin Doss, Wanlei Zhou, Shui Yu. Secure RFID Tag Ownership Transfer Based on Quadratic Residues |
402 | -- | 413 | Larry A. Dunning, Ray Kresman. Privacy Preserving Data Sharing With Anonymous ID Assignment |
414 | -- | 419 | Shih-Chun Lin, Pin-Hsun Lin. On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT |