Abstract is missing.
- Locating Missing Persons Using Age-Progression Images from Forensic ArtistsCharlie D. Frowd, William B. Erickson, James M. Lampinen. 1 [doi]
- Modeling Risks in Biometric-Based Authentication Control SystemsShawn Eastwood, Svetlana N. Yanushkevich. 2-7 [doi]
- Towards 'Receipt-Freeness' in Remote Biometric AuthenticationYoshifumi Ueshige, Kouichi Sakurai. 8-12 [doi]
- Content Reconstruction Using Keystroke Dynamics: Preliminary ResultsLiang Wu, Patrick Bours. 13-18 [doi]
- Comparison of Ear Recognition Robustness of Single-View-Based Images Rotated in DepthDaishi Watabe, Takanari Minamidani, Hideyashu Sai, Jianting Cao. 19-23 [doi]
- Multispectral Hand BiometricsSteven Samoil, Kenneth Lai, Svetlana Yanushkevich. 24-29 [doi]
- Influence of Holding Smart Phone for Acceleration-Based Gait AuthenticationYuji Watanabe. 30-33 [doi]
- Gait Identification Using Invisible Shadows: Robustness to Appearance ChangesYumi Iwashita, Ryo Kurazume, Adrian Stoica. 34-39 [doi]
- Indoor Place Categorization Using Co-occurrences of LBPs in Gray and Depth Images from RGB-D SensorsHojung Jung, Óscar Martínez Mozos, Yumi Iwashita, Ryo Kurazume. 40-45 [doi]
- FIBAR: Fingerprint Imaging by Binary Angular Reflection for Individual Identification of Metal PartsToru Takahashi, Rui Ishiyama. 46-51 [doi]
- Powered Wheelchair Platform for Assistive Technology DevelopmentMartin Henderson, Stephen Kelly, Robert Horne, Michael Gillham, Matthew Pepper, Jean-Marc Capron. 52-56 [doi]
- Ideograms Representation for Cognitive Systems in RoboticsMaria D. R.-Moreno, Adrian Stoica. 57-62 [doi]
- Zero Moment Point/Inverted Pendulum-Based Walking Algorithm for the NAO RobotIulia M. Motoc, Konstantinos Sirlantzis, Sarah Spurgeon, Peter Lee. 63-66 [doi]
- Non-overlapping Dual Camera Fall Detection Using the Nao Humanoid RobotEdward Catley, Konstantinos Sirlantzis, Gareth Howells, Stephen Kelly. 67-70 [doi]
- Obscured Asymmetric Crypto-Functions for Secured IdentificationWael Adi, Shaza Zeitouni. 71-76 [doi]
- On the Incorporation of Secure Filter in ICMetrics Group CommunicationsHasan Tahir, Gareth Howells, Huosheng Hu, Dongbing Gu, Klaus D. McDonald-Maier. 77-81 [doi]
- On Secure Group Admission Control Using ICMetricsHasan Tahir, Gareth Howells, Huosheng Hu, Dongbing Gu, Klaus D. McDonald-Maier. 82-87 [doi]
- An Assessment of Recent Attacks on Specific Embedded SystemsShoaib Ehsan, Klaus D. McDonald-Maier. 88-93 [doi]
- Protecting and Identifiying Smartphone Apps Using IcmetricsMustafa Haciosman, Bin Ye, Gareth Howells. 94-98 [doi]
- Side-Channel Attack against the Capy HIPCarlos Javier Hernández Castro, María Dolores Rodríguez-Moreno, David F. Barrero. 99-104 [doi]
- A Two-Factor Authentication System with QR Codes for Web and Mobile ApplicationsMete Eminagaoglu, Ece Cini, Gizem Sert, Derya Zor. 105-112 [doi]
- Fourth-Person Sensing for Pro-active ServicesYumi Iwashita, Kazuto Nakashima, YoonSeok Pyo, Ryo Kurazume. 113-117 [doi]
- Encouraging the Application of Virtual Environments for Space TrainingHéctor Yago Corral, Julia Clemente Párraga, María Dolores Rodríguez-Moreno. 118-123 [doi]
- Detecting Objects for Indoor Monitoring and Surveillance for Mobile RobotsCarlos Astua, Jonathan Crespo, Ramón Barber. 124-129 [doi]