The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISBAST"( http://dblp.L3S.de/Venues/ISBAST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/isbast

Publication years (Num. hits)
2012 (23) 2013 (49) 2014 (61)
Publication types (Num. hits)
inproceedings(130) proceedings(3)
Venues (Conferences, Journals, ...)
ISBAST(133)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 133 publication records. Showing 133 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Taqwa Ahmed, Maheyzah Md Siraj, Anazida Zainal, Mazura Mat Din A taxonomy on intrusion alert aggregation techniques. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Syed Zainudeen Mohd Shaid, Mohd Aizaini Maarof Malware behavior image for malware variant identification. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shabnam Kasra Kermanshahi, Mazleena Salleh An enhanced certificateless cryptosystem for mobile ad hoc networks. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohammed Faez Al-Jaberi, Anazida Zainal Data integrity and privacy model in cloud computing. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Arafat Mohammed Rashad Al-Dhaqm, Siti Hajar Othman, Shukor Abd Razak, Md. Asri Ngadi Towards adapting metamodelling technique for database forensics investigation domain. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Natasha Arjumand Shoaib Mirza, Haider Abbas, Farrukh Aslam Khan, Jalal Al-Muhtadi Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Eduardo Cermeño, Silvana Mallor, Juan A. Sigüenza Offline handwriting segmentation for writer identification. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiong Li 0002, Muhammad Khurram Khan, Saru Kumari, Junguo Liao, Wei Liang 0005 Cryptanalysis of a robust smart card authentication scheme for multi-server architecture. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abba Babakura, Md Nasir Sulaiman, Mahmud A. Yusuf Improved method of classification algorithms for crime prediction. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Warusia Yassin, Nur Izura Udzir, Azizol Abdullah, Mohd Taufik Abdullah, Hazura Zulzalil, Zaiton Muda Signature-Based Anomaly intrusion detection using Integrated data mining classifiers. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nelmiawati, Mazleena Salleh, Malek Najib Omar Pixel-based dispersal scheme for medical image survivability and confidentiality. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ahmed Yousuf Jama, Maheyzah Md Siraj, Rashidah Kadir Towards metamodel-based approach for Information Security Awareness Management. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lu Leng, Ming Li 0056, Andrew Beng Jin Teoh Matching reduction of 2DPalmHash Code. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xianfeng Guo, Xiaomin Wang Cryptanalysis and improvement of a chaotic key agreement scheme. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mehdi Barati, Azizol Abdullah, Nur Izura Udzir, Ramlan Mahmod, Norwati Mustapha Distributed Denial of Service detection using hybrid machine learning technique. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ahmad A. H. El Farra, Edmond Zahedi Interactive educational tool for teaching a simple cipher. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xi Chen, Wen Li, Zengli Liu, Zaihong Zhou Fractional low-order independent component analysis for face recognition robust to partial occlusion. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Cynthia S. Mlambo, Fulufhelo V. Nelwamondo, Mmamolatelo E. Mathekga Comparison of effective hough transform-based fingerprint alignment approaches. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rong-Jian Chen, Jhen-Wun Fan, Chin-Hao Liao Reconfigurable Galois Field multiplier. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sura Khalil Abd, Syed Abdul Rahman Al-Haddad, Fazirulhisyam Hashim, Azizol Abdullah A review of cloud security based on cryptographic mechanisms. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chng Chern Wei DNA approach for password conversion generator. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Selma Elnasir, Siti Mariyam Shamsuddin Proposed scheme for palm vein recognition based on Linear Discrimination Analysis and nearest neighbour classifier. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Malek Najib Omar, Mazleena Salleh, Majid Bakhtiari Biometric encryption to enhance confidentiality in Cloud computing. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Reza Adinehnia, Nur Izura Udzir, Lilly Suriani Affendey, Iskandar Ishak, Zurina Mohd Hanapi Effective mining on large databases for intrusion detection. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Robert T. Hans Using a biometric system to check-in and check-out luggage at airports. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wenyang Liu, Xiaomin Wang, Wenfang Zhang, Xianfeng Guo A lightweight blockcipher based on chaotic maps. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fajri Kurniawan, Mohammed S. Khalil, Muhammad Khurram Khan, Yasser M. Alginahi DWT+LSB-based fragile watermarking method for digital Quran images. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Iman Omidvar Tehrani, Subariah Ibrahim An enhanced fuzzy c-means medical segmentation algorithm. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Doaa Saleh Abobakr Baras, Siti Hajar Othman, Mohammad Nazir Ahmad, Norafida Ithnin Towards managing information security knowledge through metamodelling approach. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shukor Abd Razak Preface. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ali Sharifara, Mohd Shafry Mohd Rahim, Yasaman Anisi A general review of human face detection including a study of neural networks and Haar feature-based cascade classifier in face detection. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Eimad Abdu Abusham Face verification using Local Graph Stucture (LGS). Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Seyed-Mohsen Ghoreishi, Shukor Abd Razak, Ismail Fauzi Isnin, Hassan Chizari New secure identity-based and certificateless authenticated Key Agreement protocols without pairings. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Waleed Halboob, Ali Mamat, Ramlan Mahmod Push-based XML access control policy languages: A review. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Isao Nakanishi, Takashi Inada, Shigang Li 0001 New dedicated measuring devices for intra-palm propagation signals. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Biao Song, Yuan Tian 0003, Bingyin Zhou Design and Evaluation of Remote Video Surveillance System on Private Cloud. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sim Hiew Moi, Hishammuddin Asmuni, Rohayanti Hassan, Razib M. Othman A unified approach for unconstrained off-angle iris recognition. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, Kuala Lumpur, Malaysia, August 26-27, 2014 Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  BibTeX  RDF
1Noor Afiza Mohd Ariffin, Nor Fazlida Mohd Sani Plan recognition scheme using multi-factors authentication for smart card online system. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Saeid Bakhtiari, Subariah Ibrahim, Mazleena Salleh, Majid Bakhtiari JPEG mage encryption with Elliptic Curve Cryptography. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Muhammad Syafiq bin Samsi, Shukor Abd Razak A mechanism for privacy preserving in healthcare organizations. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Fairuz Amalina Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohd. Zamri Osman, Mohd Aizaini Maarof, Mohd. Foad Rohani Improved skin detection based on dynamic threshold using multi-colour space. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dieynaba Mall, Karim Konaté, Al-Sakib Khan Pathan SECRET: A secure and efficient certificate revocation scheme for Mobile Ad hoc Networks. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Omar Tayan, Yasser M. Alginahi A review of recent advances on multimedia watermarking security and design implications for digital Quran computing. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sisanda Makinana, Johannes J. Van Der Merwe, Tendani Malumedzha A fourier transform quality measure for iris images. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xi Chen, Luping Zheng, Zengli Liu, Jiashu Zhang Privacy-preserving biometrics using matrix random low-rank approximation approach. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Saru Kumari, Muhammad Khurram Khan, Xiong Li 0002, Rahul Kumar Notes on "a password-based remote user authentication scheme without smart card". Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fajri Kurniawan, Mohd Shafry Mohd Rahim, Mohammed S. Khalil Geometrical and eigenvector features for ear recognition. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Syed Mohd Zahid Syed Zainal Ariffin, Nursuriati Jamil Cross-band ear recognition in low or variant illumination environments. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuan Tian 0003, Mznah Al-Rodhaan, Biao Song, Abdullah Al-Dhelaan, Tinghuai Ma Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Taegyu Kim, Woomin Hwang, Ki-Woong Park, Kyu Ho Park I-Filter: Identical Structured Control Flow String filter for accelerated malware variant classification. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohammd Reza Rostami, Meisam Eslahi, Bharanidharan Shanmugam, Zuraini Ismail Botnet evolution: Network traffic indicators. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohammed A. Saleh, Azizah Abdul Manaf Optimal specifications for a protective framework against HTTP-based DoS and DDoS attacks. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hiba Zuhair Zeydan, Ali Selamat, Mazleena Salleh Survey of anti-phishing tools with detection capabilities. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Seyed-Mohsen Ghoreishi, Shukor Abd Razak, Ismail Fauzi Isnin, Hassan Chizari Security evaluation over lightweight cryptographic protocols. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hengjian Li, Jinwen Dong, Jinping Li Two-dimensional direct discriminant locality preserving projection analysis for face recognition. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Behzad Shoarian Satari, Nor Azlina Abd Rahman, Zety Marla Zainal Abidin Face recognition for security efficiency in managing and monitoring visitors of an organization. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1C. P. Sumathi, M. Mahadevi Comparative analysis of skin color model for face detection. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Seyed-Mohsen Ghoreishi, Shukor Abd Razak, Ismail Fauzi Isnin, Hassan Chizari Rushing attack against routing protocols in Mobile Ad-Hoc Networks. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Adeyemi R. Ikuesan, Shukor Abd Razak, Mazleena Salleh A psychographic framework for online user identification. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Junbo Zhang, Jian-Syuan Wong, Yi Pan 0001, Tianrui Li 0001 H2T: A Simple Hadoop-to-Twister Translator for Cloud Computing. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chun-Rong Su, Jiann-Jone Chen, Kai-Lin Chang Content-Based Image Retrieval on Reconfigurable Peer-to-Peer Networks. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jui-Lin Lai, Kuo-Hung Liao, Yi-Te Lai, Rong-Jian Chen Design CAROM Module Used in AES Structure for Sub-byte and Inv-sub-byte Transformation. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Abdul Haseeb Ahmed, Hafiz Malik Security of Biometrics Using Multimodal Approach. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiong Li 0002, Jianwei Niu 0002, Muhammad Khurram Khan, Junguo Liao Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rong-Jian Chen, Yu-Cha Chen, Jui-Lin Lai, Shi-Jinn Horng Data Hiding Using Flexible Multi-bit MER. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fajri Kurniawan, Mohammed Sayim Khalil, Muhammad Khurram Khan Core-Point Detection on Camera-Based Fingerprint Image. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shinfeng D. Lin, Jia-Jen Lin, Chin-Yao Chung Sleepy Eye's Recognition for Drowsiness Detection. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shin-Jer Yang, Pei-Ci Lai, Jyhjong Lin Design Role-Based Multi-tenancy Access Control Scheme for Cloud Services. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Martin Henzl, Petr Hanácek Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ding-Horng Chen, Yi-Chen Chang, Pai-Jun Huang, Chia-Hung Wei The Correlation Analysis between Breast Density and Cancer Risk Factor in Breast MRI Images. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chi-Chou Kao E-Health Design of EEG Signal Classification for Epilepsy Diagnosis. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ching-Nung Yang, Jia-Bin Lai Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiong Li 0002, Jianwei Niu 0002, Muhammad Khurram Khan, Junguo Liao Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nan-Han Lu, Chung-Ming Kuo, Hueisch-Jy Ding Automatic ROI Segmentation in B-Mode Ultrasound Image for Liver Fibrosis Classification. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Muzzamil Noor, Haider Abbas Anticipating Dormant Functionality in Malware: A Semantics Based Approach. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chien-Cheng Lin, Chin-Chun Chang, Deron Liang A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ling-Yuan Hsu, Shi-Jinn Horng, Pingzhi Fan, Hsien-Hsin Chou, Xian Wang 0002, Minyi Guo Adaptive Non-Local Means for Image Denoising using Turbulent PSO with No-Reference Measures. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zong-Xian Yin, Chyi-Her Lin, Wei-Cheng Lin Interactive Multimedia Technology in Case-Based Medical E-Learning. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tz-Heng Hsu, Ding-Horng Chen, Yi-Hsing Tung A Geocasting Forwarding Scheme for Mobile Nodes in VANETs. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ing-Chau Chang, Hung-Ta Tai, Dung-Lin Hsieh, Feng-Han Yeh, Siao-Hui Chang Design and Implementation of the Travelling Time- and Energy-Efficient Android GPS Navigation App with the VANET-Based A* Route Planning Algorithm. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1F. Alsaade, M. Zahrani, Turki Ali Alghamdi Score-Level Fusion in Biometric Verification. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chyouhwa Chen, Po-Chung Tung, Wei-Chung Teng Exploiting Unsupervised Learning in Publish Subscribe System Design. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wei-Ting Liao, Wen-Yen Lin, Wen-Cheng Cheng, Kin Fong Lei, Ming-Yih Lee Precision Enhancement and Performance Evaluation of a CORDIC-Based Tilting Angle Identification Algorithm for Three-Axis Accelerometers. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zeeshan-ul-hassan Usmani, Sarah Irum, Hassan Afzal, S. Mahmud How to Build an Automated Fingerprint Identification System. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1M. Anwar Hossain 0001, Sk. Md. Mizanur Rahman Towards Privacy Preserving Multimedia Surveillance System: A Secure Privacy Vault Design. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jyhjong Lin, Shin-Jer Yang An Architecture and Application of Cloud-Based Customer Knowledge Management Information Systems. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chi-Kao Chang, Min-Yuan Fang, I-Chang Jou, Nai-Chung Yang, Chung-Ming Kuo Subsampling Based Computation-Aware Motion Estimation. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hanzhou Wu, Hongxia Wang 0001 Multibit Color-Mapping Steganography Using Depth-First Search. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1 International Symposium on Biometrics and Security Technologies, ISBAST 2013, 2-5 July, 2013, Chengdu, Sichuan, China Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  BibTeX  RDF
1Shaohua Wan 0001, Hua Yang Comparison among Methods of Ensemble Learning. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jiann-Shu Lee, Fei-Hsiang Huang, Hsiao-Chen Kuo A New Image Watermarking Scheme Using Non-dominated Sorting Genetic Algorithm II. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ning Wang 0007, Qiong Li, Ahmed A. Abd El-Latif 0001, Xuehu Yan, Xiamu Niu A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face Images. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Johannes K. Chiang, Eric Yen, Yu-Long Lin On Interoperation of Hybrid Cloud. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fajri Kurniawan, Mohammed Sayim Khalil, Muhammad Khurram Khan, Yasser M. Alginahi Authentication and Tamper Detection of Digital Holy Quran Images. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chih-Hua Tai, Jen-Wei Huang, Meng-Hao Chung Privacy Preserving Frequent Pattern Mining on Multi-cloud Environment. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ping-Chin Wang, Chow-Sing Lin Enhanced Backward Error Concealment for H.264/AVC Videos on Error-Prone Networks. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zeeshan-ul-hassan Usmani, Sarah Irum, Hassan Afzal, S. Mahmud Plug-n-Play AFIS Development for Criminal and Civil Applications. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu New Identity-Based Sequential Aggregate Signature Scheme from RSA. Search on Bibsonomy ISBAST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 133 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license