Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Matthew Ibekwe, Stanislav Vítek, Milos Klima, Petr Dostál |
Modeling and evaluation of image quality in wireless surveillance networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 345-362, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth K. Yamamoto, Sergey N. Vecherin, D. Keith Wilson, Christian T. Borden, Elizabeth Bettencourt, Chris L. Pettit |
General software for multimodal signal modeling and optimal sensor placement: Environmental Awareness for Sensor and Emitter Employment (EASEE). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 66-77, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Addisson Salazar, Gonzalo Safont, Antonio Soriano 0001, Luis Vergara |
Automatic credit card fraud detection based on non-linear signal processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 207-212, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jeff Hamar, Rick Dove |
A quorum sensing pattern for multi-agent self-organizing security systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 319-324, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mark D. Murton, Dale T. van Dongen, Michael P. Ross, Francis A. Bouchier |
Toward a performance requirement for sensored conformable apertures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 22-26, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ed Rao |
Air cargo screening for stowaway detection: Carbon dioxide monitors and Heartbeat Monitor assessment and qualification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 261-266, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Anika Pflug, Philip Michael Back, Christoph Busch 0001 |
Towards making HCS ear detection robust against rotation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 90-96, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sung Choi, David Zage |
Addressing insider threat using "where you are" as fourth factor authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 147-153, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Donald A. Sheaffer, David C. Burnett |
Improved surface swimmer detection through multimodal data fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 292-296, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sylvio Bisson, Pushkar E. Godbole, Matthew McKee, Marc St-Amand |
Methods for the prevention of the use of mobile phones in Correctional institutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 237-245, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Virginia Espinosa-Duro, Marcos Faúndez-Zanuy, Jirí Mekyska |
Contribution of the temperature of the objects to the problem of thermal imaging focusing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 363-366, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yuichiro Yamada, Daisuke Sasagawa |
Super-resolution processing of the partial pictorial image of the single pictorial image which eliminated artificiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 338-344, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Eric D. Vugrin, Kevin L. Stamber, Michael J. Baca, Gio Kao, Hai Le, Michael Mtchell, Rick Ramirez, Kim Welch |
A mission resilience assessment methodology for infrastructure disruptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 53-58, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xuebing Zhou, Christoph Busch 0001 |
Measuring privacy and security of iris fuzzy commitment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 168-173, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Stanislav Vítek, Milos Klima, Petr Dostál |
Cost-effective automatic stereoscopic security video system 3DSec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 353-358, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Richard M. Guest, Oscar Miguel-Hurtado |
Enhancing static biometric signature verification using Speeded-Up Robust Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 213-217, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Paul C. Haddock, John W. Hatley, William D. Morse, Robert D. Tooley |
Integrated communications and navigation module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 1-5, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Min-Ku Kim, Dong-Guk Han, Jeong Choon Ryoo, Okyeon Yi |
CPA performance enhancement based on spectrogram. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 195-200, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Brett C. Tjaden, Robert Floodeen |
Communication among incident responders - A study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 1-6, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ernesto Gonzaga, Harold J. Cossette |
Plasma barrier force-field access denial system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 297-304, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Philipp Sury, Sandrina Ritzmann, Adrian Schwaninger |
Initial results of web based blended learning in the field of air cargo security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 274-279, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lisa A. Shay, Gregory J. Conti, Dominic M. Larkin, John Nelson |
A framework for analysis of quotidian exposure in an instrumented world. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 126-134, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Esther González, Luis Álvarez, Luis Mazorra |
Normalization and feature extraction on ear images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 97-104, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dean Dominguez, Mancel Jordan Parks, Adam D. Williams, Susan Washburn |
Special Nuclear material and critical infrastructure security modeling and simulation of physical protection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 10-14, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | David Streisand, Rick Dove |
Basic genetic-algorithm-neural-network (GANN) pattern with a self-organizing security example. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 312-318, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Aesun Park, Dong-Guk Han, Jeong Choon Ryoo |
CPA performance comparison based on Wavelet Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 201-206, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Marcia Mendes, Adrian Schwaninger, Nadine Strebel, Stefan Michel |
Why laptops should be screened separately when conventional x-ray screening is used. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 267-273, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chang-Lung Tsai, Chun-Jung Chen, Wei-Lieh Hsu |
Multi-morphological image data hiding based on the application of Rubik's cubic algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 135-139, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | S. Rankin, N. Cohen, K. MacLennan-Brown, K. Sage |
CCTV Operator Performance Benchmarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 325-330, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lester A. Cano |
Using Neural Networks for Extended Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 246-250, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Garzia, Roberto Cusani, Enzo Sammarco |
Advanced access control system for ports. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 154-162, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andre Gagnon, René Schmidt |
Trial results conducted by multiple Canadian government agencies of the recent covert technology developped by Tektrap to trace and track the integrity of maritime containers worldwide. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 78-82, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Robert Gurney, Mike Rhead, Soodamani Ramalingam, Neil Cohen |
Working towards an international ANPR Standard - An initial investigation into the UK standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 331-337, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Edward L. Witzke, Joseph P. Brenkosh, Karl L. Green, Loren E. Riblett, James M. Wiseman |
Encryption in mobile wireless mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 251-256, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zdenek Vintr, Michal Vintr, Jindrich Malach |
Evaluation of physical protection system effectiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 15-21, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Philip Campbell |
Department of Defense Instruction 8500.2 "Information Assurance (IA) Implementation: " A retrospective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 187-194, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zdenek Vintr, David Valis, Jindrich Malach |
Attack tree-based evaluation of physical protection systems vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 59-65, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso |
Multisampling approach applied to contactless hand biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 224-229, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | |
IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![IEEE, 978-1-4673-2450-2 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Felicia A. Durán |
Probabilistic basis and assessment methodology for effectiveness of protecting nuclear materials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 43-52, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ramon Blanco-Gonzalo, Oscar Miguel-Hurtado, Aitor Mendaza-Ormaza, Raul Sánchez-Reillo |
Handwritten signature recognition in mobile scenarios: Performance evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 174-179, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mofreh A. Hogo |
Biometrie keys based on pseudorandom sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 110-118, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jonny A. Uribe, Luis Fonseca, J. F. Vargas |
Video based system for railroad collision warning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 280-285, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Keith Harman, Wayne K. Messner |
Outdoor perimeter security sensors a forty year perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 1-9, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mike Rhead, Robert Gurney, Soodamani Ramalingam, Neil Cohen |
Accuracy of automatic number plate recognition (ANPR) and real world UK number plate problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012, pp. 286-291, 2012, IEEE, 978-1-4673-2450-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Brockly, Richard M. Guest, Stephen J. Elliott, James Scott |
Dynamic signature verification and the human biometric sensor interaction model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-6, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Petr Dostál, Milos Klima |
Locally adaptive demosaicing technique for security images based upon region-of-interest analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-10, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Imanol de Arriba-Ruiz, Félix Pérez-Martínez, José Maria Muñoz-Ferreras |
New technique for static target detection in dense-multipath urban environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-7, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | |
International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![IEEE, 978-1-4577-0902-9 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alberto de Santos Sierra, Carmen Sánchez Ávila, Gonzalo Bailador, Javier Guerra Casanova |
Study of the effect of blurriness in image acquisition for hand biometrics in mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-7, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kamil Malinka, Petr Hanácek, Michal Trzos |
Evaluation of biometric authentication based on visual evoked potentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-7, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tien-Sheng Lin, Ting-Hsu Chang, Chia-Hung Chien, Sy-Yen Kuo |
Quantum circuits and quantum message integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Carlos M. Travieso, Juan José Fuertes 0002, Jesús B. Alonso |
Derivative method for hand palm texture biometric verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ben Jones, Tom Hounsham, Carinna Brown, Stephen Tarr |
The development of a methodology for the evaluation of Wide Area Detection Systems (WADS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ester González, Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso |
Looking for hand shape based biometric devices interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Vishrut Sharma |
A theoretical implementation of Blended Program Analysis for virus signature extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-4, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rudolf Volner, Petr Bores |
Home system - Biometric privacy and identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Enric Sesa-Nogueras |
Discriminative power of online handwritten words for writer recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-8, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tien-Sheng Lin, Chia-Hung Chien, Ting-Hsu Chang, Sy-Yen Kuo |
Quantum signature scheme for vehicular networks using entangled states. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-6, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, Fabio Roli |
Robustness analysis of likelihood ratio score fusion rule for multimodal biometric systems under spoof attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-8, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jaime Ortiz-López, Javier Galbally, Julian Fiérrez, Javier Ortega-Garcia |
Predicting iris vulnerability to direct attacks based on quality related features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-6, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jaime Roberto Ticay-Rivas, Marcos del Pozo-Baños, Carlos M. Travieso, Jesús B. Alonso, Miguel A. Ferrer |
Multi-spectral information regarding face recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-9, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Keiji Takeda, Masayoshi Mizutani |
Design and prototyping of framework for automated continuous malware collection and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-6, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nora Barroso, Karmele López de Ipiña, Carmen Hernández 0001, Aitzol Ezeiza |
Matrix Covariance Estimation methods for robust Security Speech Recognition with under-resourced conditions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-6, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Koldo Pecina, Ricardo Estremera, Alfonso Bilbao, Enrique Bilbao |
Physical and Logical Security management organization model based on ISO 31000 and ISO 27001. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Smejkal, Jindrich Kodl |
Strong authentication using dynamic biometric signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ana Ferreira 0001, Ricardo João Cruz Correia, Luis Antunes 0002 |
Usability of authentication and access control: A case study in healthcare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-7, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Inmaculada Tomeo-Reyes, Ivan Rubio-Polo, Judith Liu-Jimenez, Belen Fernandez-Saavedra |
Quality metrics influence on iris recognition systems performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-7, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jirí Mekyska, Xavier Font-Aragonès, Marcos Faúndez-Zanuy, Ruben Hernandez-Mingorance, Aythami Morales, Miguel Angel Ferrer-Ballester |
Thermal hand image segmentation for biometric recogniton. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jong-Yeon Park, Okyeon Yi, Dong-Guk Han, Dooho Choi |
Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Demian Tinkiel, David White, Neil A. Trappe |
Efficient design of THz security systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-9, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Olive E. Wetter, Hartwig Fuhrmann, Michael Lipphardt, Franziska Hofer |
Bringing adversaries together: The importance of a common management-level approach in complex work domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-6, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stephen J. Elliott, Mitchell Mershon, Vandhana Chandrasekaran, Shruti Gupta |
The evolution of the HBSI model with the convergence of performance methodologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-4, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Koldo Pecina, Alfonso Bilbao, Enrique Bilbao |
Physical and logical Security Risk Analysis model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-7, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Richard M. Guest, Oscar Miguel-Hurtado |
Enhancing off-line biometric signature verification using a fingerprint assessment approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-4, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jesús Villalba 0001, Eduardo Lleida |
Preventing replay attacks on speaker verification systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-8, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Fernando Martín Rodríguez, Juan Manuel Fernandez Montenegro |
Scanned documents secure authentication based on simple watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Philipp Sury, Adrian Schwaninger, Jasmin Nef |
Improving secure handling of air cargo by means of web based blended learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-3, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rudolf Volner, Dasa Ticha, Hedvika Palásthy |
Computer-based cognitive and socio-emotional training in personal health information management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-4, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Ibekwe, Milos Klima, Pavel Soucek |
The objective image quality criteria and QoE in the security technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Chen Wang, Chen-Ta Hsieh, Chin-Chuan Han, Kuo-Chin Fan |
The color identification of automobiles for video surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chien-Lung Hsu, Boo-Chen Liu, Yu-Li Lin |
A digital evidence protection method with hierarchical access control mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-9, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ed Rao |
Cargo supply chain technology development and standardization initiatives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-6, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rudolf Volner, Lubomir Volner |
Information security risk management for air transport. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-3, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yuichiro Yamada |
Increase of digital CCTVs makes it difficult to analyze record images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-10, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nora Barroso, Karmele López de Ipiña, Aitzol Ezeiza, Carmen Hernández 0001 |
Language identification for Internet security in the Basque context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zdenek Vintr, Michal Vintr, Jindrich Malach |
Does appropriate software support for target identification exist? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Adam Wamsley, Stephen J. Elliott, Carl Dunkelberger, Mitch Mershon |
Analysis of slap segmentation and HBSI errors across different force levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Karmele López de Ipiña, Carmen Hernández 0001, Nora Barroso, Aitzol Ezeiza |
Must security listen to Kokoro? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Garzia, Roberto Cusani |
The integrated safety/security system of the Gran Sasso mountain in Italy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-7, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Javier Guerra Casanova, Carmen Sánchez Ávila, Gonzalo Bailador, Alberto de Santos Sierra |
Time series distances measures to analyze in-air signatures to authenticate users on mobile phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-7, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alberto de Santos Sierra, Carmen Sánchez Ávila, Gonzalo Bailador, Javier Guerra Casanova |
Secure access control by means of human stress detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-8, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ed Rao |
Air cargo screening technology qualification program: Process and development of Qualified Screening Technology List. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-6, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nora Barroso, Karmele López de Ipiña, Aitzol Ezeiza, Carmen Hernández 0001 |
An ontology-driven semantic speech recognition system for security tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-6, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Gómez Vilda, María Victoria Rodellar Biarge, Cristina Muñoz-Mulas, Rafael Martínez-Olalla, Luis Miguel Mazaira-Fernández, Agustín Álvarez Marquina |
Glottal parameter estimation by wavelet transform for voice biometry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-8, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Aitor Mendaza-Ormaza, Oscar Miguel-Hurtado, Ramon Blanco-Gonzalo, Francisco-Jose Diez-Jimeno |
Analysis of handwritten signature performances using mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-6, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jia-Guu Leu, Liang-tsair Geeng, Chang En Pu, Jyh-Bin Shiau |
Speaker verification based on comparing normalized spectrograms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nora Barroso, Karmele López de Ipiña, Carmen Hernández 0001, Aitzol Ezeiza |
Design of multi-feature class models for Speech Recognition Security systems with under-resourced languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-6, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christian Maaser, Harald Baier |
A concept for monitoring self-transforming code using memory page access control management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-7, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marcia Mendes, Adrian Schwaninger, Stefan Michel |
Does the application of virtually merged images influence the effectiveness of computer-based training in x-ray screening? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011, pp. 1-8, 2011, IEEE, 978-1-4577-0902-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|