The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISSP"( http://dblp.L3S.de/Venues/ICISSP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icissp

Publication years (Num. hits)
2015 (44) 2016 (67) 2017 (81) 2018 (70) 2019 (84) 2020 (94) 2021 (89) 2022 (76) 2023 (91) 2024 (101)
Publication types (Num. hits)
inproceedings(787) proceedings(10)
Venues (Conferences, Journals, ...)
ICISSP(797)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 797 publication records. Showing 797 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Giuseppe Settanni, Florian Skopik, Yegor Shovgenya, Roman Fiedler A Collaborative Analysis System for Cross-organization Cyber Incident Handling. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nils Ulltveit-Moe, Steffen Pfrang, László Erdödi, Héctor Nebot Mitigating Local Attacks Against a City Traffic Controller. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ana Ferreira 0001, Gabriele Lenzini Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Md. Selim Hossain, Ehsan Saeedi, Yinan Kong High-Performance FPGA Implementation of Elliptic Curve Cryptography Processor over Binary Field GF(2^163). Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Julien Hatin, Estelle Cherrier, Jean-Jacques Schwartzmann, Vincent Frey, Christophe Rosenberger A Continuous LoA Compliant Trust Evaluation Method. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hiroya Susuki, Rie Shigetomi Yamaguchi, Shizuo Sakamoto Multi-factor Authentication Updating System Evaluation Dynamically for Service Continuity. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Asim K. Pal, Subrata Bose, Arpita Maitra Collaborative Information Service - Privacy Algebra for User Defined Security. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, S. Yamaguchi The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nilakantha Paudel, Marco Querini, Giuseppe F. Italiano Handwritten Signature Verification for Mobile Phones. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Muhammad Imran Tariq, Vito Santarcangelo Analysis of ISO 27001: 2013 Controls Effectiveness for Cloud Computing. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kexin Qiao, Lei Hu, Siwei Sun Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Iraklis Symeonidis, Pagona Tsormpatzoudi, Bart Preneel Collateral Damage of Online Social Network Applications. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tamir Lavi, Ehud Gudes Trust-based Dynamic RBAC. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Cong Li, Qingni Shen, Kang Chen, Yahui Yang, Zhonghai Wu Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nadia Jemil Abdu, Ulrike Lechner A Threat Analysis Model for Identity and Access Management. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daniel D. Hein, Hossein Saiedian Predicting Attack Prone Software Components using Repository Mined Change Metrics. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Iman Sedeeq, Frans Coenen, Alexei Lisitsa 0001 A Statistical Approach to the Detection of HTML Attribute Permutation Steganography. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Cihangir Tezcan Truncated, Impossible, and Improbable Differential Analysis of ASCON. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christoph Kerschbaumer, Sid Stamm, Stefan Brunthaler 0001 Injecting CSP for Fun and Security. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Edgar R. Weippl Ethics in Security Research. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  BibTeX  RDF
1Kurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif Declassification of Information with Complex Filter Functions. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang, Zhonghai Wu DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Germain Jolly, Sylvain Vernois, Christophe Rosenberger An Observe-and-Detect Methodology for the Security and Functional Testing of Smart Card Applications. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peter Maynard 0001, Kieran McLaughlin, Sakir Sezer Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Izzat Alsmadi, Dianxiang Xu, Jin-Hee Cho Interaction-based Reputation Model in Online Social Networks. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Masahiro Ishii 0002, Atsuo Inomata, Kazutoshi Fujikawa A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost Estimate. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ching-Nung Yang, Stelvio Cimato, Jihi-Han Wu, Song-Ruei Cai 3-Out-of-n Cheating Prevention Visual Cryptographic Schemes. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tim Wambach, Katharina Bräunlich Retrospective Study of Third-party Web Tracking. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christine Izuakor Understanding the Impact of Cyber Security Risks on Safety. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sylvestre Uwizeyemungu, Placide Poba-Nzaou Security and Privacy Practices in Healthcare Information Systems: A Cluster Analysis of European Hospitals. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hans-Joachim Lenz Tax Fraud and Investigation Procedures - Everybody, Every Where, Every Time. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  BibTeX  RDF
1Simon Broenner, Hans Höfken, Marko Schuba Streamlining Extraction and Analysis of Android RAM Images. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Elena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, N. Asokan Characterizing SEAndroid Policies in the Wild. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Feno Heriniaina R. A Privacy Threat for Internet Users in Internet-censoring Countries. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yogesh Bhanu, Sebastian Dännart, Henning von Kielpinski, Alexander Laux, Ulrike Lechner, Tobias Lehmann, Andreas Rieb, Martin Riedl 0001, Florian Wolf A Cyberthreat Search Process and Service. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Toru Nakamura, Shinsaku Kiyomoto, Welderufael B. Tesfay, Jetzabel M. Serna Personalised Privacy by Default Preferences - Experiment and Analysis. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Simone Bossi, Tea Anselmo, Guido Bertoni On TLS 1.3 - Early Performance Analysis in the IoT Field. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ammar Abuelgasim, Anne Kayem An Approach to Personalized Privacy Policy Recommendations on Online Social Networks. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alessio Botta, Aniello Avallone, Mauro Garofalo, Giorgio Ventre Internet Streaming and Network Neutrality: Comparing the Performance of Video Hosting Services. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar A Quantitative Methodology for Security Risk Assessment of Enterprise Business Processes. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1M. Lisa Mathews, Anupam Joshi, Tim Finin Detecting Botnets using a Collaborative Situational-aware IDPS. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1C. Shao, H. Li, G. Xu Quantitative Evaluation of Security on Cryptographic ICs against Fault Injection Attacks. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daniela Pöhn Risk Management for Dynamic Metadata Exchange via a Trusted Third Party. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dominik Teubert, Fred Grossmann, Ulrike Meyer Anomaly-based Mobile Malware Detection: System Calls as Source for Features. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko, Kenichi Higuchi A Practical-time Attack on Reduced-round MISTY1. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gerard Draper-Gil, Arash Habibi Lashkari, Mohammad Saiful Islam Mamun, Ali A. Ghorbani 0001 Characterization of Encrypted and VPN Traffic using Time-related Features. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Edwin T. L. Rampine, Cynthia H. Ngejane A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template Security. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Cristina-Loredana Duta, Laura Gheorghe, Nicolae Tapus Performance Analysis of Real Time Implementations of Voice Encryption Algorithms using Blackfin Processors. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Phiwa Mzila Review Analysis of Properties for an Ideal Secure Biometric Template Scheme. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Olivier Camp, Steven Furnell, Paolo Mori (eds.) Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21, 2016. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  BibTeX  RDF
1Gencer Erdogan, Ketil Stølen, Jan Øyvind Aagedal Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois, Pinar Emirdag, Zhouyixing Wang On Detection of Bitcoin Mining Redirection Attacks. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Preetam Mukherjee 0001, Chandan Mazumdar A Novel Model of Security Policies and Requirements. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Philippe Desfray Model Repositories at the Enterprises and Systems Scale - The Modelio Constellation Solution. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  BibTeX  RDF
1Abdulhadi Shoufan, Hassan Alnoon, Joonsang Baek On the Power Consumption of Cryptographic Processors in Civil Microdrones. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Matrazali Noorafiza, Hiroshi Maeda, Ryuya Uda, Toshiyuki Kinoshita, M. Shiratori Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mina Sheikh Alishahi, Mohamed Mejri, Nadia Tawbi Clustering Spam Emails into Campaigns. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andrea Huszti, Zita Kovács Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jayagopal Narayanaswamy, Raghav V. Sampangi, Srinivas Sampalli HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frîncu, Viktor K. Prasanna Model-driven Privacy Assessment in the Smart Grid. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Josselyn Le Moing, Ingo Stengel The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait Recognition. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Carsten Büttner, Sorin A. Huss A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Davide Maiorca, Davide Ariu, Igino Corona, Giorgio Giacinto A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Günther Pernul Privacy in Social Networks - Existing Challenges and Proposals for Solution. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  BibTeX  RDF
1Bushra Anjum, Manish Rajangam, Harry G. Perros, Wenjuan Fan Filtering Unfair Users - A Hidden Markov Model Approach. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  BibTeX  RDF
1Wei-Han Lee, Ruby B. Lee Multi-sensor Authentication to Improve Smartphone Security. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Inger Anne Tøndel, Maria B. Line, Gorm Johansen Assessing Information Security Risks of AMI - What Makes it so Difficult?. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ansgar R. Koene, Elvira Perez, Christopher James Carter, Ramona Statache, Svenja Adolphs, Claire O'Malley, Tom Rodden, Derek McAuley Research Ethics and Public Trust, Preconditions for Continued Growth of Internet Mediated Research - Public Confidence in Internet Mediate Research. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mehmud Abliz, Taieb F. Znati Defeating DDoS using Productive Puzzles. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  BibTeX  RDF
1Patrick D. McDaniel A New Science of Security Decision Making. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  BibTeX  RDF
1Stuart Jacobs Optimizing Cryptographically based Security in Wireless Networks. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  BibTeX  RDF
1Henrik Nergaard, Nils Ulltveit-Moe, Terje Gjøsæter A Scratch-based Graphical Policy Editor for XACML. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hyoyoung Lim, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura Malware Classification Method Based on Sequence of Traffic Flow. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bryan Ford Hiding in a Panopticon - Grand Challenges in Internet Anonymity. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  BibTeX  RDF
1Michael Kunz, Ludwig Fuchs, Michael Netter, Günther Pernul Analyzing Quality Criteria in Role-based Identity and Access Management. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rafael Accorsi A Posteriori Process Security Control. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  BibTeX  RDF
1Masaki Inamura Expansions of CHAP - Modificationless on Its Structures of Packet and Data Exchange. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Al Amin Hossain, Weining Zhang Privacy and Security Concern of Online Social Networks from User Perspective. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gregor Bonney, Hans Höfken, Benedikt Paffen, Marko Schuba ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLC. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Taegyu Kim, Woomin Hwang, Chulmin Kim, Dong-Jae Shin, Ki-Woong Park, Kyu Ho Park Malfinder: Accelerated Malware Classification System through Filtering on Manycore System. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Olivier Camp, Edgar R. Weippl, Christophe Bidan, Esma Aïmeur (eds.) ICISSP 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  BibTeX  RDF
1Aderonke Busayo Sakpere, Anne V. D. M. Kayem Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jan Lehnhardt, Tobias Rho, Adrian Spalka, Armin B. Cremers Performance-optimized Indexes for Inequality Searches on Encrypted Data in Practice. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vassilis Prevelakis, Mohammad Hamad A Policy-based Communications Architecture for Vehicles. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sylvestre Uwizeyemungu, Placide Poba-Nzaou Understanding Information Technology Security Standards Diffusion - An Institutional Perspective. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mélanie Favre, Sylvaine Picard, Julien Bringer, Hervé Chabanne Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sriram Krishnamachari, Mehrdad Nojoumian, Kemal Akkaya Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Puloma Roy, Chandan Mazumdar Modelling of Enterprise Insider Threats. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Steven Furnell From Passwords to Biometrics - In Pursuit of a Panacea. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  BibTeX  RDF
1Arathi Arakala, Hao Hao, Stephen A. Davis, Kathy J. Horadam The Palm Vein Graph - Feature Extraction and Matching. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bolam Kang, Sung Cheol Goh, Myungsun Kim Private Web Search with Constant Round Efficiency. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Benoît Vibert, Zhigang Yao, Sylvain Vernois, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features. Search on Bibsonomy ICISSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #797 of 797 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license