Abstract is missing.
- Fundamentals of Biometric System Design: New Course for Electrical, Computer, and Software Engineering StudentsSvetlana N. Yanushkevich, Anna V. Shmerko. 3-8 [doi]
- Fingerprint - Iris Fusion Based Identification System Using a Single Hamming Distance MatcherAsim Baig, Ahmed Bouridane, Fatih Kurugollu, Gang Qu. 9-12 [doi]
- Experiments with Fingerprint Image QualityMartin Drahanský. 13-17 [doi]
- Color Iris Recognition Using Hypercomplex Gabor WaveletsFares S. Al-Qunaieer, Lahouari Ghouti. 18-19 [doi]
- Color Iris Recognition Using Quaternion Phase CorrelationLahouari Ghouti, Fares S. Al-Qunaieer. 20-25 [doi]
- Gait Recognition Using Shadow AnalysisYumi Iwashita, Adrian Stoica. 26-31 [doi]
- Automating the Processes Involved in Facial Composite Production and IdentificationCharlie D. Frowd, Anna Petkovic, Kamran Nawaz, Yasmeen Bashir. 35-42 [doi]
- Commercial Face Recognition Doesn t WorkRob Jenkins, David White. 43-48 [doi]
- Caricaturing to Improve Face MatchingPeter J. B. Hancock, Alex H. McIntyre, Josef Kittler. 49 [doi]
- Finding and Discriminating Faces Using Biological BarcodesSteven C. Dakin, Roger J. Watt. 50 [doi]
- Toward a HLAC-Based Histological Diagnosis System for Virtual-Slide ImagesKenji Iwata, Yutaka Satoh, Takumi Kobayashi, Toshio Ueshiba, Katsuhiko Sakaue, Kôiti Hasida, Nobuyuki Otsu, Yoichi Kameda, Yohei Miyagi, Yuji Sakuma, Keiji Kikuchi, Eiju Tsuchiya. 53-57 [doi]
- Recognition of Dynamic Texture Patterns Using CHLAC FeaturesTakumi Kobayashi, Tetsuya Higuchi, Tsuneharu Miyajima, Nobuyuki Otsu. 58-60 [doi]
- Histopathological Diagnostic Support Technology Using Higher-Order Local Autocorrelation FeaturesHirokazu Nosato, Hidenori Sakanashi, Masahiro Murakawa, Tetsuya Higuchi, Nobuyuki Otsu, Kensuke Terai, Nobuyuki Hiruta, Noriaki Kameda. 61-65 [doi]
- Anomalousness Detection for Surgery Videos Using CHLAC FeatureFumio Sakabe, Masahiro Murakawa, Takumi Kobayashi, Tetsuya Higuchi, Nobuyuki Otsu. 66-68 [doi]
- Architecturally-Enforced InfoSec in a General-Purpose Self-Configurable SystemNicholas J. Macias, Peter M. Athanas. 71-76 [doi]
- Mechatronic Security and Robot AuthenticationWael Adi. 77-82 [doi]
- Autonomous Physical Secret Functions and Clone-Resistant IdentificationWael Adi. 83-88 [doi]
- Characterization of a Voltage Glitch Attack Detector for Secure DevicesAsier Goikoetxea Yanci, Stephen Pickles, Tughrul Arslan. 91-96 [doi]
- Research on Critical Infrastructures and Critical Information InfrastructuresFeruza Sattarova Yusufovna, Farkhod Alisherov Alisherovich, Minkyu Choi, Eun-suk Cho, Furkhat Tadjibayev Abdurashidovich, Tai-Hoon Kim. 97-101 [doi]
- Crossed Crypto-Scheme in WPA PSK ModeMaricel O. Balitanas, Rosslin John Robles, Nayoun Kim, Tai-Hoon Kim. 102-106 [doi]
- Glitch Logic and Applications to Computing and Information SecurityAdrian Stoica, Srinivas Katkoori. 107-112 [doi]
- Ensuring Secure Healthcare Communications via ICmetric Based Encryption on Unseen DevicesEvangelos Papoutsis, Gareth Howells, Andrew B. T. Hopkins, Klaus D. McDonald-Maier. 113-117 [doi]
- Color Texture Retrieval Using Hypercomplex WaveletsFahad S. Al-Qadda, Lahouari Ghouti. 121-126 [doi]
- The Radiation Tolerance Problem: Analytical Modelling of Inter-Dependency of ParametersH. J. Kadim. 127-131 [doi]
- A Method of Project Evaluation and Review Technique (PERT) Optimization by Means of Genetic ProgrammingDaniel Howard. 132-135 [doi]