Abstract is missing.
- Holmes: A data theft forensic frameworkRamya Jayaram Masti, Vincent Lenders, Mario Strasser, Stefan Engel, Bernhard Plattner. 1-6 [doi]
- Improved Spread Spectrum multibit watermarkingJoceli Mayer. 1-6 [doi]
- Context intra-coding scheme for securing surveillance videos and its applicationsYi-Chong Zeng, Chiou-Ting Hsu. 1-6 [doi]
- Cumulants-based Radar Specific Emitter IdentificationAugusto Aubry, A. Bazzoni, V. Carotenuto, Antonio De Maio, P. Failla. 1-6 [doi]
- Laplacian of smoothed image as representation for face recognitionAnil Kumar Sao, B. Yegnanarayana. 1-6 [doi]
- Painless migration from passwords to two factor authenticationZiqing Mao, Dinei A. F. Florêncio, Cormac Herley. 1-6 [doi]
- Brain waves based user recognition using the "eyes closed resting conditions" protocolPatrizio Campisi, Gaetano Scarano, Fabio Babiloni, Fabrizio de Vico Fallani, Stefania Colonnese, Emanuele Maiorana, L. Forastiere. 1-6 [doi]
- Efficient privacy preserving K-means clustering in a three-party settingMichael Beye, Zekeriya Erkin, Reginald L. Lagendijk. 1-6 [doi]
- Use of turbo codes with low-rate convolutional constituent codes in fingerprinting scenariosJoan Tomàs-Buliart, Ana Gomez-Muro, Marcel Fernandez, Miguel Soriano. 1-6 [doi]
- Attack using reconstructed fingerprintSheng Li, Alex C. Kot. 1-6 [doi]
- On the consistency of the biometric menagerie for irises and iris matchersJeffrey R. Paone, Patrick J. Flynn. 1-6 [doi]
- Smart selective encryption of CAVLC for H.264/AVC videoLoic Dubois, William Puech, Jacques Blanc-Talon. 1-6 [doi]
- ElectroMagnetic analysis (EMA) of software AES on Java mobile phonesDriss Aboulkassimi, Michel Agoyan, Laurent Freund, Jacques Fournier, Bruno Robisson, Assia Tria. 1-6 [doi]
- Audio codec identification through payload samplingSamet Hicsonmez, Husrev T. Sencar, Ismail Avcibas. 1-6 [doi]
- A study of face recognition of identical twins by humansSoma Biswas, Kevin W. Bowyer, Patrick J. Flynn. 1-6 [doi]
- Channel aware encryption and decision fusion for wireless sensor networksHyoungsuk Jeon, Jinho Choi 0001, Steven W. McLaughlin, Jeongseok Ha. 1-6 [doi]
- Exploring DCT coefficient quantization effect for image tampering localizationWei Wang 0025, Jing Dong, Tieniu Tan. 1-6 [doi]
- Mixing fingerprints for generating virtual identitiesAsem A. Othman, Arun Ross. 1-6 [doi]
- Software code obfuscation by hiding control flow information in stackVivek Balachandran, Sabu Emmanuel. 1-6 [doi]
- "Re-synchronization by moments": An efficient solution to align Side-Channel tracesNicolas Debande, Youssef Souissi, Maxime Nassar, Sylvain Guilley, Thanh-Ha Le, Jean-Luc Danger. 1-6 [doi]
- A novel algorithm for obfuscated code analysisBreno Silva Pinto, Ryan Barnett. 1-5 [doi]
- Cross camera people counting with perspective estimation and occlusion handlingTsung-Yi Lin, Yen-Yu Lin, Ming-Fang Weng, Yu-Chiang Frank Wang, Yu-Feng Hsu, Hong-Yuan Mark Liao. 1-6 [doi]
- An analysis on attacker actions in fingerprint-copy attack in source camera identificationRoberto Caldelli, Irene Amerini, Andrea Novi. 1-6 [doi]
- Splay trees based early packet rejection mechanism against DoS traffic targeting firewall default security ruleZouheir Trabelsi, Safaa Zeidan. 1-6 [doi]
- DWT-based additive image watermarking using the Student-t priorAntonis Mairgiotis, Yongyi Yang, Lisimachos P. Kondi. 1-6 [doi]
- Analysis of non-aligned double JPEG artifacts for the localization of image forgeriesTiziano Bianchi, Alessandro Piva. 1-6 [doi]
- Variable window power spectral density attackPhilip Hodgers, Keanhong Boey, Máire O'Neill. 1-6 [doi]
- Division between encrypted integers by means of Garbled CircuitsRiccardo Lazzeretti, Mauro Barni. 1-6 [doi]
- Pupil detection under lighting and pose variations in the visible and active infrared bandsThirimachos Bourlai, Cameron Whitelam, Ioannis A. Kakadiaris. 1-6 [doi]
- Fingerprinting Tor's hidden service log files using a timing channelJuan A. Elices, Fernando Pérez-González, Carmela Troncoso. 1-6 [doi]
- Video Phylogeny: Recovering near-duplicate video relationshipsZanoni Dias, Anderson Rocha, Siome Goldenstein. 1-6 [doi]
- How contact pressure, contact time, smearing and oil/skin lotion influence the aging of latent fingerprint traces: First results for the binary pixel feature using a CWL sensorRonny Merkel, Jana Dittmann, Claus Vielhauer. 1-6 [doi]
- Eye detection in the Middle-Wave Infrared spectrum: Towards recognition in the darkThirimachos Bourlai, Zain Jafri. 1-6 [doi]
- Prefilter design for forensic resampling estimationDavid Vazquez-Padin, Fernando Pérez-González. 1-6 [doi]
- Lower bounds on almost-separating binary codesJosé Moreira, Grigory Kabatiansky, Marcel Fernandez. 1-6 [doi]
- Secure binary embeddings for privacy preserving nearest neighborsPetros Boufounos, Shantanu Rane. 1-6 [doi]
- SmartCM a smart card fault injection simulatorJean-Baptiste Machemie, Clement Mazin, Jean-Louis Lanet, Julien Cartigny. 1-6 [doi]
- Fast matching for video/audio fingerprinting algorithmsMani Malek Esmaeili, Rabab K. Ward, Mehrdad Fatourechi. 1-6 [doi]
- BotCloud: Detecting botnets using MapReduceJérôme François, Shaonan Wang, Walter Bronzi, Radu State, Thomas Engel. 1-6 [doi]
- A Dempster-Shafer framework for decision fusion in image forensicsMarco Fontani, Tiziano Bianchi, A. De Rosa, Alessandro Piva, Mauro Barni. 1-6 [doi]