• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 13
Next 10 →

ANALYSIS OF TEXTURAL FEATURES FOR FACE BIOMETRIC ANTI-SPOOFING

by Muhammad-adeel Waris, Honglei Zhang, Iftikhar Ahmad, Serkan Kiranyaz, Moncef Gabbouj , 2013
"... True authentication predicted on biometrics has received upsurge attention during the last few years, as it provides facile way to access the system through basic physical and behavioral characteristics. Face recognition being a nonintrusive recognition requires less participation from the user comp ..."
Abstract - Add to MetaCart
database. Index Terms — anti-spoofing, face biometric, textural analysis, counter measure.

On the Definitions of Cryptographic Security: Chosen-Ciphertext Attack Revisited

by unknown authors , 1999
"... ..."
Abstract - Add to MetaCart
Abstract not found

Secure Link State Routing Protocol: A Framework for Network Survivability

by Dijiang Huang, Amit Sinha, Deep Medhi
"... Network survivability has been studied extensively from the view of node and link failures. The domain of survivability goes beyond just the physical failures and one needs to address this issue when faced with security threats that can render the network logically dysfunctional without causing any ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Network survivability has been studied extensively from the view of node and link failures. The domain of survivability goes beyond just the physical failures and one needs to address this issue when faced with security threats that can render the network logically dysfunctional without causing any

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.

CHI-Interactivity_AR1

by Andrea Bianchi , Ian Oakley , Dong Soo Kwon , Andrea Bianchi
"... Abstract Sensitive digital content associated with or owned by individuals now pervades everyday life. Mediating accessing to it in ways that are usable and secure is an ongoing challenge. This paper briefly discusses a series of five PIN entry and transmission systems that address observation atta ..."
Abstract - Add to MetaCart
discussion of the relevance of this work and the upcoming issues it faces. PIN, authentication, security, usability, observation Keywords ACM Classification Keywords H5.2. User Interfaces: Input devices and strategies General Terms Security, Human Factors Introduction The Internet has ushered in a

Contents

by Maxwell Krohn, Michael O. Rabin, Michael Mitzenmacher , 1999
"... 1.1 Private and Public Key Cryptography..................... 5 ..."
Abstract - Add to MetaCart
1.1 Private and Public Key Cryptography..................... 5

Towards Secure Electronic Workflows Examples of Applied PKI Supervisor:

by Sebastian Fritsch, Dipl Ing, Vangelis Karatsiolis Erklärung , 2006
"... Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006 ..."
Abstract - Add to MetaCart
Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006

Privacy and Security in Video Surveillance

by Thomas Winkler , Bernhard Rinner , Thomas Winkler , Bernhard Rinner
"... Abstract Video surveillance systems are usually installed to increase the safety and security of people or property in the monitored areas. Typical threat scenarios are robbery, vandalism, shoplifting or terrorism. Other application scenarios are more intimate and private such as home monitoring or ..."
Abstract - Add to MetaCart
's faces from images. For marker detection and tracking, probabilistic AdaBoost and particle filtering are used. Spindler et al. [53] apply similar ideas in the context of building automation and monitoring applications. Personal data is obfuscated based on individual privacy settings. For identification

By

by Richard Brian Adams , 2013
"... I declare that this thesis is my own account of my research and contains as its main content work which has not previously been submitted for a degree at any tertiary education institution. ..."
Abstract - Add to MetaCart
I declare that this thesis is my own account of my research and contains as its main content work which has not previously been submitted for a degree at any tertiary education institution.

unknown title

by Pasquale De Meo A, Giovanni Quattrone A, Giorgio Terracina B, Domenico Ursino A
"... IOS Press Utilization of intelligent agents for supporting citizens in their access to e-government services 1 ..."
Abstract - Add to MetaCart
IOS Press Utilization of intelligent agents for supporting citizens in their access to e-government services 1
Next 10 →
Results 1 - 10 of 13
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University