Text
IEEE Transactions on Information Forensics and Security
Fingerprint Enhancement via Multi-Scale Patch Based Sparse Representation
Cardiovascular Biometrics: combining Mechanical and Electrical Signals
Live Video Forensics: Source Identification in Lossy Wireless Networks
Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers
Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations
Reconstruction-Based Metric Learning for Unconstrained Face Verification
Security Enhancement of Cooperative Single Carrier Systems
Learning Fingerprint Reconstruction: From Minutiae to Image
An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration
Smart Meter Privacy for Multiple Users in the Presence of an Alternative Energy Source
Implementation of a New Lightweight Encryption Design for Embedded Security
A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval
Software Puzzle: A Countermeasure to Resource-Infiated Denial-of-Service Attacks
Time-Bound Anonymous Authentication for Roaming Networks
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications
Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT
Correlated Differential Privacy: Hiding Information in Non-IID Data Set
Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture
Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential
Electromagnetic and Power Analysis
Fault Attacks on STRNGs: Impact of Glitches, Temperature, and Underpowering on Randomness
Analysis and Improvement ofa PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks
Secrecy Transmission With a Helper: To Relay or to Jam
LIVE: Lightweight lntegrity Verification and Content Access Control for Named Data Networking
Iris Recognition: What ls Beyond Bit Fragility?
Investigating the Discriminative Power of Keystroke Sound
Advanced Joint Bayesian Method for Face Verification
Fundamental Limits of Caching With Secure Delivery
Effective Key Management in Dynamic Wireless Sensor Networks
Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones
Reconstructing Synchronous Scrambler With Robust Detection Capability in the Presence of Noise
A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability
3D Ear Segmen and Classification Through Indexing
No copy data
No other version available