


default search action
ICCST 2011: Barcelona, Spain
- International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011. IEEE 2011, ISBN 978-1-4577-0902-9

- Ana Ferreira

, Ricardo João Cruz Correia
, Luis Antunes:
Usability of authentication and access control: A case study in healthcare. 1-7 - Fernando Martín Rodríguez

, Juan Manuel Fernandez Montenegro
:
Scanned documents secure authentication based on simple watermarking. 1-5 - Kamil Malinka

, Petr Hanácek
, Michal Trzos:
Evaluation of biometric authentication based on visual evoked potentials. 1-7 - Olive E. Wetter, Hartwig Fuhrmann, Michael Lipphardt, Franziska Hofer:

Bringing adversaries together: The importance of a common management-level approach in complex work domains. 1-6 - Jirí Mekyska

, Xavier Font-Aragonès, Marcos Faúndez-Zanuy
, Ruben Hernandez-Mingorance, Aythami Morales
, Miguel Angel Ferrer-Ballester
:
Thermal hand image segmentation for biometric recogniton. 1-5 - Jia-Guu Leu, Liang-tsair Geeng, Chang En Pu, Jyh-Bin Shiau:

Speaker verification based on comparing normalized spectrograms. 1-5 - Vishrut Sharma:

A theoretical implementation of Blended Program Analysis for virus signature extraction. 1-4 - Fabio Garzia, Roberto Cusani:

The integrated safety/security system of the Gran Sasso mountain in Italy. 1-7 - Marcia Mendes, Adrian Schwaninger

, Stefan Michel
:
Does the application of virtually merged images influence the effectiveness of computer-based training in x-ray screening? 1-8 - Chien-Lung Hsu, Boo-Chen Liu, Yu-Li Lin:

A digital evidence protection method with hierarchical access control mechanisms. 1-9 - Richard M. Guest, Oscar Miguel-Hurtado:

Enhancing off-line biometric signature verification using a fingerprint assessment approach. 1-4 - Ester González

, Aythami Morales
, Miguel A. Ferrer
, Carlos M. Travieso
, Jesús B. Alonso
:
Looking for hand shape based biometric devices interoperability. 1-5 - Maria João Campos, Manuel Eduardo Correia

, Luis Antunes:
Leveraging identity management interoperability in eHealth. 1-8 - Imanol de Arriba-Ruiz, Félix Pérez-Martínez, José Maria Muñoz-Ferreras

:
New technique for static target detection in dense-multipath urban environments. 1-7 - Ed Rao:

Air cargo screening technology qualification program: Process and development of Qualified Screening Technology List. 1-6 - Ed Rao:

Cargo supply chain technology development and standardization initiatives. 1-6 - Carlos M. Travieso

, Juan José Fuertes, Jesús B. Alonso
:
Derivative method for hand palm texture biometric verification. 1-5 - Rudolf Volner, Lubomir Volner:

Information security risk management for air transport. 1-3 - Rudolf Volner, Petr Bores:

Home system - Biometric privacy and identity management. 1-5 - Rudolf Volner, Dasa Ticha, Hedvika Palásthy:

Computer-based cognitive and socio-emotional training in personal health information management. 1-4 - Ben Jones, Tom Hounsham, Carinna Brown, Stephen Tarr:

The development of a methodology for the evaluation of Wide Area Detection Systems (WADS). 1-5 - Koldo Pecina, Ricardo Estremera, Alfonso Bilbao, Enrique Bilbao:

Physical and Logical Security management organization model based on ISO 31000 and ISO 27001. 1-5 - Koldo Pecina, Alfonso Bilbao, Enrique Bilbao:

Physical and logical Security Risk Analysis model. 1-7 - Matthew Ibekwe, Milos Klima, Pavel Soucek:

The objective image quality criteria and QoE in the security technology. 1-5 - Zdenek Vintr

, Michal Vintr
, Jindrich Malach:
Does appropriate software support for target identification exist? 1-5 - Yuichiro Yamada:

Increase of digital CCTVs makes it difficult to analyze record images. 1-10 - Keiji Takeda, Masayoshi Mizutani:

Design and prototyping of framework for automated continuous malware collection and analysis. 1-6 - Yu-Chen Wang, Chen-Ta Hsieh, Chin-Chuan Han, Kuo-Chin Fan:

The color identification of automobiles for video surveillance. 1-5 - Jong-Yeon Park

, Okyeon Yi, Dong-Guk Han, Dooho Choi
:
Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT. 1-5 - Petr Dostál, Milos Klima:

Locally adaptive demosaicing technique for security images based upon region-of-interest analysis. 1-10 - Inmaculada Tomeo-Reyes, Ivan Rubio-Polo, Judith Liu-Jimenez, Belen Fernandez-Saavedra:

Quality metrics influence on iris recognition systems performance. 1-7 - Jaime Uriarte-Antonio, Daniel Hartung, J. Enrique Suarez Pascual, Raul Sánchez-Reillo

:
Vascular biometrics based on a minutiae extraction approach. 1-7 - Tien-Sheng Lin, Ting-Hsu Chang, Chia-Hung Chien, Sy-Yen Kuo

:
Quantum circuits and quantum message integrity. 1-5 - Tien-Sheng Lin, Chia-Hung Chien, Ting-Hsu Chang, Sy-Yen Kuo

:
Quantum signature scheme for vehicular networks using entangled states. 1-6 - Aitor Mendaza-Ormaza, Oscar Miguel-Hurtado, Ramon Blanco-Gonzalo, Francisco-Jose Diez-Jimeno:

Analysis of handwritten signature performances using mobile devices. 1-6 - Javier Guerra Casanova, Carmen Sánchez Ávila

, Gonzalo Bailador, Alberto de Santos Sierra:
Time series distances measures to analyze in-air signatures to authenticate users on mobile phones. 1-7 - Demian Tinkiel, David White, Neil A. Trappe

:
Efficient design of THz security systems. 1-9 - Jaime Roberto Ticay-Rivas

, Marcos del Pozo-Baños
, Carlos M. Travieso
, Jesús B. Alonso
, Miguel A. Ferrer
:
Multi-spectral information regarding face recognition. 1-9 - Alberto de Santos Sierra, Carmen Sánchez Ávila

, Gonzalo Bailador, Javier Guerra Casanova:
Study of the effect of blurriness in image acquisition for hand biometrics in mobile devices. 1-7 - Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, Fabio Roli:

Robustness analysis of likelihood ratio score fusion rule for multimodal biometric systems under spoof attacks. 1-8 - Alberto de Santos Sierra, Carmen Sánchez Ávila

, Gonzalo Bailador, Javier Guerra Casanova:
Secure access control by means of human stress detection. 1-8 - Michael Brockly, Richard M. Guest, Stephen J. Elliott

, James Scott:
Dynamic signature verification and the human biometric sensor interaction model. 1-6 - Stephen J. Elliott

, Mitchell Mershon, Vandhana Chandrasekaran, Shruti Gupta:
The evolution of the HBSI model with the convergence of performance methodologies. 1-4 - Adam Wamsley, Stephen J. Elliott

, Carl Dunkelberger, Mitch Mershon:
Analysis of slap segmentation and HBSI errors across different force levels. 1-5 - Philipp Sury, Adrian Schwaninger

, Jasmin Nef:
Improving secure handling of air cargo by means of web based blended learning. 1-3 - Claudia Nickel, Christoph Busch:

Classifying accelerometer data via Hidden Markov Models to authenticate people by the way they walk. 1-6 - Christian Maaser, Harald Baier:

A concept for monitoring self-transforming code using memory page access control management. 1-7 - Jesús Villalba

, Eduardo Lleida
:
Preventing replay attacks on speaker verification systems. 1-8 - Karmele López de Ipiña

, Carmen Hernández
, Nora Barroso
, Aitzol Ezeiza
:
Must security listen to Kokoro? 1-5 - Nora Barroso

, Karmele López de Ipiña
, Aitzol Ezeiza
, Carmen Hernández
:
Language identification for Internet security in the Basque context. 1-5 - Nora Barroso

, Karmele López de Ipiña
, Carmen Hernández
, Aitzol Ezeiza
:
Matrix Covariance Estimation methods for robust Security Speech Recognition with under-resourced conditions. 1-6 - Nora Barroso

, Karmele López de Ipiña
, Carmen Hernández
, Aitzol Ezeiza
:
Design of multi-feature class models for Speech Recognition Security systems with under-resourced languages. 1-6 - Nora Barroso

, Karmele López de Ipiña
, Aitzol Ezeiza
, Carmen Hernández
:
An ontology-driven semantic speech recognition system for security tasks. 1-6 - Jaime Ortiz-López, Javier Galbally

, Julian Fiérrez
, Javier Ortega-Garcia
:
Predicting iris vulnerability to direct attacks based on quality related features. 1-6 - Miriam Moreno-Moreno

, Julian Fiérrez
, Rubén Vera-Rodríguez
, Josep Parrón
:
Distance-based feature extraction for biometric recognition of Millimeter Wave body images. 1-6 - Pedro Gómez-Vilda, María Victoria Rodellar Biarge, Cristina Muñoz-Mulas, Rafael Martínez-Olalla, Luis Miguel Mazaira-Fernández, Agustín Álvarez-Marquina

:
Glottal parameter estimation by wavelet transform for voice biometry. 1-8 - Vladimir Smejkal

, Jindrich Kodl:
Strong authentication using dynamic biometric signature. 1-5 - Enric Sesa-Nogueras

:
Discriminative power of online handwritten words for writer recognition. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














