Abstract is missing.
- New technique for static target detection in dense-multipath urban environmentsImanol de Arriba-Ruiz, Félix Pérez-Martínez, José Maria Muñoz-Ferreras. 1-7 [doi]
- Does the application of virtually merged images influence the effectiveness of computer-based training in x-ray screening?Marcia Mendes, Adrian Schwaninger, Stefan Michel. 1-8 [doi]
- Design of multi-feature class models for Speech Recognition Security systems with under-resourced languagesNora Barroso, Karmele López de Ipiña, Carmen Hernández 0001, Aitzol Ezeiza. 1-6 [doi]
- Time series distances measures to analyze in-air signatures to authenticate users on mobile phonesJavier Guerra Casanova, Carmen Sánchez Ávila, Gonzalo Bailador, Alberto de Santos Sierra. 1-7 [doi]
- Quantum circuits and quantum message integrityTien-Sheng Lin, Ting-Hsu Chang, Chia-Hung Chien, Sy-Yen Kuo. 1-5 [doi]
- Vascular biometrics based on a minutiae extraction approachJaime Uriarte-Antonio, Daniel Hartung, J. Enrique Suarez Pascual, Raul Sánchez-Reillo. 1-7 [doi]
- Robustness analysis of likelihood ratio score fusion rule for multimodal biometric systems under spoof attacksZahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, Fabio Roli. 1-8 [doi]
- Analysis of slap segmentation and HBSI errors across different force levelsAdam Wamsley, Stephen Elliott, Carl Dunkelberger, Mitch Mershon. 1-5 [doi]
- Looking for hand shape based biometric devices interoperabilityEster González, Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso. 1-5 [doi]
- An ontology-driven semantic speech recognition system for security tasksNora Barroso, Karmele López de Ipiña, Aitzol Ezeiza, Carmen Hernández 0001. 1-6 [doi]
- Distance-based feature extraction for biometric recognition of Millimeter Wave body imagesMiriam Moreno-Moreno, Julian Fiérrez, Rubén Vera-Rodríguez, Josep Parrón. 1-6 [doi]
- The evolution of the HBSI model with the convergence of performance methodologiesStephen Elliott, Mitchell Mershon, Vandhana Chandrasekaran, Shruti Gupta. 1-4 [doi]
- Preventing replay attacks on speaker verification systemsJesus Villalba, Eduardo Lleida. 1-8 [doi]
- Study of the effect of blurriness in image acquisition for hand biometrics in mobile devicesAlberto de Santos Sierra, Carmen Sánchez Ávila, Gonzalo Bailador, Javier Guerra Casanova. 1-7 [doi]
- Ghost key patterns with Equidistant Chosen Message attack on RSA-CRTJong-Yeon Park, Okyeon Yi, Dong-Guk Han, Dooho Choi. 1-5 [doi]
- Derivative method for hand palm texture biometric verificationCarlos M. Travieso, Juan José Fuertes, Jesús B. Alonso. 1-5 [doi]
- Multi-spectral information regarding face recognitionJaime Roberto Ticay-Rivas, Marcos del Pozo-Baños, Carlos M. Travieso, Jesús B. Alonso, Miguel A. Ferrer. 1-9 [doi]
- Predicting iris vulnerability to direct attacks based on quality related featuresJaime Ortiz-López, Javier Galbally, Julian Fiérrez, Javier Ortega-Garcia. 1-6 [doi]
- Scanned documents secure authentication based on simple watermarkingFernando Martín Rodríguez, Juan Manuel Fernandez Montenegro. 1-5 [doi]
- Information security risk management for air transportRudolf Volner, Lubomir Volner. 1-3 [doi]
- Physical and Logical Security management organization model based on ISO 31000 and ISO 27001Koldo Pecina, Ricardo Estremera, Alfonso Bilbao, Enrique Bilbao. 1-5 [doi]
- Usability of authentication and access control: A case study in healthcareAna Margarida Ferreira, Ricardo João Cruz Correia, Luis Antunes 0002. 1-7 [doi]
- Computer-based cognitive and socio-emotional training in personal health information managementRudolf Volner, Dasa Ticha, Hedvika Palásthy. 1-4 [doi]
- Glottal parameter estimation by wavelet transform for voice biometryPedro Gómez Vilda, María Victoria Rodellar Biarge, Cristina Muñoz-Mulas, Rafael Martínez-Olalla, Luis Miguel Mazaira-Fernández, Agustín Álvarez Marquina. 1-8 [doi]
- Design and prototyping of framework for automated continuous malware collection and analysisKeiji Takeda, Masayoshi Mizutani. 1-6 [doi]
- A concept for monitoring self-transforming code using memory page access control managementChristian Maaser, Harald Baier. 1-7 [doi]
- Dynamic signature verification and the human biometric sensor interaction modelMichael Brockly, Richard M. Guest, Stephen J. Elliott, James Scott. 1-6 [doi]
- Efficient design of THz security systemsDemian Tinkiel, David White, Neil A. Trappe. 1-9 [doi]
- Matrix Covariance Estimation methods for robust Security Speech Recognition with under-resourced conditionsNora Barroso, Karmele López de Ipiña, Carmen Hernández 0001, Aitzol Ezeiza. 1-6 [doi]
- Increase of digital CCTVs makes it difficult to analyze record imagesYuichiro Yamada. 1-10 [doi]
- Does appropriate software support for target identification exist?Zdenek Vintr, Michal Vintr, Jindrich Malach. 1-5 [doi]
- Must security listen to Kokoro?Karmele López de Ipiña, Carmen Hernández 0001, Nora Barroso, Aitzol Ezeiza. 1-5 [doi]
- The color identification of automobiles for video surveillanceYu-Chen Wang, Chen-Ta Hsieh, Chin-Chuan Han, Kuo-Chin Fan. 1-5 [doi]
- Leveraging identity management interoperability in eHealthMaria João Campos, Manuel Eduardo Correia, Luis Antunes 0002. 1-8 [doi]
- A theoretical implementation of Blended Program Analysis for virus signature extractionVishrut Sharma. 1-4 [doi]
- Strong authentication using dynamic biometric signatureVladimir Smejkal, Jindrich Kodl. 1-5 [doi]
- Home system - Biometric privacy and identity managementRudolf Volner, Petr Bores. 1-5 [doi]
- Evaluation of biometric authentication based on visual evoked potentialsKamil Malinka, Petr Hanácek, Michal Trzos. 1-7 [doi]
- Discriminative power of online handwritten words for writer recognitionEnric Sesa-Nogueras. 1-8 [doi]
- The integrated safety/security system of the Gran Sasso mountain in ItalyFabio Garzia, Roberto Cusani. 1-7 [doi]
- Air cargo screening technology qualification program: Process and development of Qualified Screening Technology ListEd Rao. 1-6 [doi]
- The objective image quality criteria and QoE in the security technologyMatthew Ibekwe, Milos Klima, Pavel Soucek. 1-5 [doi]
- Physical and logical Security Risk Analysis modelKoldo Pecina, Alfonso Bilbao, Enrique Bilbao. 1-7 [doi]
- Language identification for Internet security in the Basque contextNora Barroso, Karmele López de Ipiña, Aitzol Ezeiza, Carmen Hernández 0001. 1-5 [doi]
- The development of a methodology for the evaluation of Wide Area Detection Systems (WADS)Ben Jones, Tom Hounsham, Carinna Brown, Stephen Tarr. 1-5 [doi]
- Secure access control by means of human stress detectionAlberto de Santos Sierra, Carmen Sánchez Ávila, Gonzalo Bailador, Javier Guerra Casanova. 1-8 [doi]
- Thermal hand image segmentation for biometric recognitonJirí Mekyska, Xavier Font-Aragonès, Marcos Faúndez-Zanuy, Ruben Hernandez-Mingorance, Aythami Morales, Miguel Angel Ferrer-Ballester. 1-5 [doi]
- Bringing adversaries together: The importance of a common management-level approach in complex work domainsOlive E. Wetter, Hartwig Fuhrmann, Michael Lipphardt, Franziska Hofer. 1-6 [doi]
- Cargo supply chain technology development and standardization initiativesEd Rao. 1-6 [doi]
- A digital evidence protection method with hierarchical access control mechanismsChien-Lung Hsu, Boo-Chen Liu, Yu-Li Lin. 1-9 [doi]
- Quality metrics influence on iris recognition systems performanceInmaculada Tomeo-Reyes, Ivan Rubio-Polo, Judith Liu-Jimenez, Belen Fernandez-Saavedra. 1-7 [doi]
- Analysis of handwritten signature performances using mobile devicesAitor Mendaza-Ormaza, Oscar Miguel-Hurtado, Ramon Blanco-Gonzalo, Francisco-Jose Diez-Jimeno. 1-6 [doi]
- Quantum signature scheme for vehicular networks using entangled statesTien-Sheng Lin, Chia-Hung Chien, Ting-Hsu Chang, Sy-Yen Kuo. 1-6 [doi]
- Locally adaptive demosaicing technique for security images based upon region-of-interest analysisPetr Dostál, Milos Klima. 1-10 [doi]
- Enhancing off-line biometric signature verification using a fingerprint assessment approachRichard Guest, Oscar Miguel-Hurtado. 1-4 [doi]
- Classifying accelerometer data via Hidden Markov Models to authenticate people by the way they walkClaudia Nickel, Christoph Busch. 1-6 [doi]
- Speaker verification based on comparing normalized spectrogramsJia-Guu Leu, Liang-tsair Geeng, Chang En Pu, Jyh-Bin Shiau. 1-5 [doi]
- Improving secure handling of air cargo by means of web based blended learningPhilipp Sury, Adrian Schwaninger, Jasmin Nef. 1-3 [doi]