default search action
ICCST 2011: Barcelona, Spain
- International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011. IEEE 2011, ISBN 978-1-4577-0902-9
- Ana Ferreira, Ricardo João Cruz Correia, Luis Antunes:
Usability of authentication and access control: A case study in healthcare. 1-7 - Fernando Martín Rodríguez, Juan Manuel Fernandez Montenegro:
Scanned documents secure authentication based on simple watermarking. 1-5 - Kamil Malinka, Petr Hanácek, Michal Trzos:
Evaluation of biometric authentication based on visual evoked potentials. 1-7 - Olive E. Wetter, Hartwig Fuhrmann, Michael Lipphardt, Franziska Hofer:
Bringing adversaries together: The importance of a common management-level approach in complex work domains. 1-6 - Jirí Mekyska, Xavier Font-Aragonès, Marcos Faúndez-Zanuy, Ruben Hernandez-Mingorance, Aythami Morales, Miguel Angel Ferrer-Ballester:
Thermal hand image segmentation for biometric recogniton. 1-5 - Jia-Guu Leu, Liang-tsair Geeng, Chang En Pu, Jyh-Bin Shiau:
Speaker verification based on comparing normalized spectrograms. 1-5 - Vishrut Sharma:
A theoretical implementation of Blended Program Analysis for virus signature extraction. 1-4 - Fabio Garzia, Roberto Cusani:
The integrated safety/security system of the Gran Sasso mountain in Italy. 1-7 - Marcia Mendes, Adrian Schwaninger, Stefan Michel:
Does the application of virtually merged images influence the effectiveness of computer-based training in x-ray screening? 1-8 - Chien-Lung Hsu, Boo-Chen Liu, Yu-Li Lin:
A digital evidence protection method with hierarchical access control mechanisms. 1-9 - Richard M. Guest, Oscar Miguel-Hurtado:
Enhancing off-line biometric signature verification using a fingerprint assessment approach. 1-4 - Ester González, Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso:
Looking for hand shape based biometric devices interoperability. 1-5 - Maria João Campos, Manuel Eduardo Correia, Luis Antunes:
Leveraging identity management interoperability in eHealth. 1-8 - Imanol de Arriba-Ruiz, Félix Pérez-Martínez, José Maria Muñoz-Ferreras:
New technique for static target detection in dense-multipath urban environments. 1-7 - Ed Rao:
Air cargo screening technology qualification program: Process and development of Qualified Screening Technology List. 1-6 - Ed Rao:
Cargo supply chain technology development and standardization initiatives. 1-6 - Carlos M. Travieso, Juan José Fuertes, Jesús B. Alonso:
Derivative method for hand palm texture biometric verification. 1-5 - Rudolf Volner, Lubomir Volner:
Information security risk management for air transport. 1-3 - Rudolf Volner, Petr Bores:
Home system - Biometric privacy and identity management. 1-5 - Rudolf Volner, Dasa Ticha, Hedvika Palásthy:
Computer-based cognitive and socio-emotional training in personal health information management. 1-4 - Ben Jones, Tom Hounsham, Carinna Brown, Stephen Tarr:
The development of a methodology for the evaluation of Wide Area Detection Systems (WADS). 1-5 - Koldo Pecina, Ricardo Estremera, Alfonso Bilbao, Enrique Bilbao:
Physical and Logical Security management organization model based on ISO 31000 and ISO 27001. 1-5 - Koldo Pecina, Alfonso Bilbao, Enrique Bilbao:
Physical and logical Security Risk Analysis model. 1-7 - Matthew Ibekwe, Milos Klima, Pavel Soucek:
The objective image quality criteria and QoE in the security technology. 1-5 - Zdenek Vintr, Michal Vintr, Jindrich Malach:
Does appropriate software support for target identification exist? 1-5 - Yuichiro Yamada:
Increase of digital CCTVs makes it difficult to analyze record images. 1-10 - Keiji Takeda, Masayoshi Mizutani:
Design and prototyping of framework for automated continuous malware collection and analysis. 1-6 - Yu-Chen Wang, Chen-Ta Hsieh, Chin-Chuan Han, Kuo-Chin Fan:
The color identification of automobiles for video surveillance. 1-5 - Jong-Yeon Park, Okyeon Yi, Dong-Guk Han, Dooho Choi:
Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT. 1-5 - Petr Dostál, Milos Klima:
Locally adaptive demosaicing technique for security images based upon region-of-interest analysis. 1-10 - Inmaculada Tomeo-Reyes, Ivan Rubio-Polo, Judith Liu-Jimenez, Belen Fernandez-Saavedra:
Quality metrics influence on iris recognition systems performance. 1-7 - Jaime Uriarte-Antonio, Daniel Hartung, J. Enrique Suarez Pascual, Raul Sánchez-Reillo:
Vascular biometrics based on a minutiae extraction approach. 1-7 - Tien-Sheng Lin, Ting-Hsu Chang, Chia-Hung Chien, Sy-Yen Kuo:
Quantum circuits and quantum message integrity. 1-5 - Tien-Sheng Lin, Chia-Hung Chien, Ting-Hsu Chang, Sy-Yen Kuo:
Quantum signature scheme for vehicular networks using entangled states. 1-6 - Aitor Mendaza-Ormaza, Oscar Miguel-Hurtado, Ramon Blanco-Gonzalo, Francisco-Jose Diez-Jimeno:
Analysis of handwritten signature performances using mobile devices. 1-6 - Javier Guerra Casanova, Carmen Sánchez Ávila, Gonzalo Bailador, Alberto de Santos Sierra:
Time series distances measures to analyze in-air signatures to authenticate users on mobile phones. 1-7 - Demian Tinkiel, David White, Neil A. Trappe:
Efficient design of THz security systems. 1-9 - Jaime Roberto Ticay-Rivas, Marcos del Pozo-Baños, Carlos M. Travieso, Jesús B. Alonso, Miguel A. Ferrer:
Multi-spectral information regarding face recognition. 1-9 - Alberto de Santos Sierra, Carmen Sánchez Ávila, Gonzalo Bailador, Javier Guerra Casanova:
Study of the effect of blurriness in image acquisition for hand biometrics in mobile devices. 1-7 - Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, Fabio Roli:
Robustness analysis of likelihood ratio score fusion rule for multimodal biometric systems under spoof attacks. 1-8 - Alberto de Santos Sierra, Carmen Sánchez Ávila, Gonzalo Bailador, Javier Guerra Casanova:
Secure access control by means of human stress detection. 1-8 - Michael Brockly, Richard M. Guest, Stephen J. Elliott, James Scott:
Dynamic signature verification and the human biometric sensor interaction model. 1-6 - Stephen J. Elliott, Mitchell Mershon, Vandhana Chandrasekaran, Shruti Gupta:
The evolution of the HBSI model with the convergence of performance methodologies. 1-4 - Adam Wamsley, Stephen J. Elliott, Carl Dunkelberger, Mitch Mershon:
Analysis of slap segmentation and HBSI errors across different force levels. 1-5 - Philipp Sury, Adrian Schwaninger, Jasmin Nef:
Improving secure handling of air cargo by means of web based blended learning. 1-3 - Claudia Nickel, Christoph Busch:
Classifying accelerometer data via Hidden Markov Models to authenticate people by the way they walk. 1-6 - Christian Maaser, Harald Baier:
A concept for monitoring self-transforming code using memory page access control management. 1-7 - Jesús Villalba, Eduardo Lleida:
Preventing replay attacks on speaker verification systems. 1-8 - Karmele López de Ipiña, Carmen Hernández, Nora Barroso, Aitzol Ezeiza:
Must security listen to Kokoro? 1-5 - Nora Barroso, Karmele López de Ipiña, Aitzol Ezeiza, Carmen Hernández:
Language identification for Internet security in the Basque context. 1-5 - Nora Barroso, Karmele López de Ipiña, Carmen Hernández, Aitzol Ezeiza:
Matrix Covariance Estimation methods for robust Security Speech Recognition with under-resourced conditions. 1-6 - Nora Barroso, Karmele López de Ipiña, Carmen Hernández, Aitzol Ezeiza:
Design of multi-feature class models for Speech Recognition Security systems with under-resourced languages. 1-6 - Nora Barroso, Karmele López de Ipiña, Aitzol Ezeiza, Carmen Hernández:
An ontology-driven semantic speech recognition system for security tasks. 1-6 - Jaime Ortiz-López, Javier Galbally, Julian Fiérrez, Javier Ortega-Garcia:
Predicting iris vulnerability to direct attacks based on quality related features. 1-6 - Miriam Moreno-Moreno, Julian Fiérrez, Rubén Vera-Rodríguez, Josep Parrón:
Distance-based feature extraction for biometric recognition of Millimeter Wave body images. 1-6 - Pedro Gómez Vilda, María Victoria Rodellar Biarge, Cristina Muñoz-Mulas, Rafael Martínez-Olalla, Luis Miguel Mazaira-Fernández, Agustín Álvarez Marquina:
Glottal parameter estimation by wavelet transform for voice biometry. 1-8 - Vladimir Smejkal, Jindrich Kodl:
Strong authentication using dynamic biometric signature. 1-5 - Enric Sesa-Nogueras:
Discriminative power of online handwritten words for writer recognition. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.