Abstract is missing.
- Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit - Cross-Feature Type ComparisonsJutta Hämmerle-Uhl, Michael Pober, Andreas Uhl. 3-17 [doi]
- Achieving Anonymity against Major Face Recognition AlgorithmsBenedikt Driessen, Markus Dürmuth. 18-33 [doi]
- Client-Side Biometric Verification Based on Trusted ComputingJan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens. 34-49 [doi]
- Dedicated Hardware for Attribute-Based Credential VerificationGeoffrey Ottoy, Jorn Lapon, Vincent Naessens, Bart Preneel, Lieven De Strycker. 50-65 [doi]
- Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast DecryptionY. Sreenivasa Rao, Ratna Dutta. 66-81 [doi]
- Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm AttackAndreas Hasselberg, René Zimmermann, Christian Kraetzer, Tobias Scheidat, Claus Vielhauer, Karl Kümmel. 85-94 [doi]
- Video Watermarking Scheme with High Payload and Robustness against Geometric DistortionHuajian Liu, Yiyao Li, Martin Steinebach. 95-104 [doi]
- Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion ErrorsBoris Assanovich, William Puech, Iuliia Tkachenko. 105-112 [doi]
- Detecting Resized Double JPEG Compressed Images - Using Support Vector MachineHieu Cuong Nguyen, Stefan Katzenbeisser. 113-122 [doi]
- Pit Stop for an Audio Steganography AlgorithmAndreas Westfeld, Jürgen Wurzer, Christian Fabian, Ernst Piller. 123-134 [doi]
- Robust Hash Algorithms for TextMartin Steinebach, Peter Klöckner, Nils Reimers, Dominik Wienand, Patrick Wolf. 135-144 [doi]
- Hardware Based Security Enhanced Direct Memory AccessMarcel Eckert, Igor Podebrad, Bernd Klauer. 145-151 [doi]
- Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device SensitivityTakayuki Yamada, Seiichi Gohshi, Isao Echizen. 152-161 [doi]
- E-Learning of IT Security Threats: A Game Prototype for ChildrenJana Fruth, Carsten Schulze, Marleen Rohde, Jana Dittmann. 162-172 [doi]
- Hiding Information in Social Networks from De-anonymization Attacks by Using Identity SeparationGábor György Gulyás, Sándor Imre. 173-184 [doi]
- An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control ModelsXiaofeng Xia. 185-194 [doi]
- Authentication with Time Features for Keystroke Dynamics on TouchscreensMatthias Trojahn, Florian Arndt, Frank Ortmeier. 197-199 [doi]
- Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic ScansMario Hildebrandt, Andrey Makrushin, Kun Qian, Jana Dittmann. 200-203 [doi]
- Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy ImplicationsMario Hildebrandt, Jennifer Sturm, Jana Dittmann, Claus Vielhauer. 204-206 [doi]
- SocACL: An ASP-Based Access Control Language for Online Social NetworksEdward Caprin, Yan Zhang. 207-210 [doi]
- Watermark Resynchronization: An Efficient Approach Based on Eulerian Tours around a Robust SkeletonKonstantinos Raftopoulos, Klimis S. Ntalianis, Paraskevi K. Tzouveli, Nicolas Tsapatsoulis, Aleatha Parker-Wood, Marin Ferecatu. 211-214 [doi]
- Face Recognition from Degraded Images - Super Resolution Approach by Non-adaptive Image-Independent Compressive Sensing DictionariesSabah A. Jassim. 217-232 [doi]
- Trustworthy Software DevelopmentSachar Paulus, Nazila Gol Mohammadi, Thorsten Weyer. 233-247 [doi]