default search action
8th EST 2019: Colchester, UK
- Eighth International Conference on Emerging Security Technologies, EST 2019, Colchester, UK, July 22-24, 2019. IEEE 2019, ISBN 978-1-7281-5546-3
- Julian Murphy, Gareth Howells, Klaus D. McDonald-Maier:
A Machine Learning Method For Sensor Authentication Using Hidden Markov Models. 1-5 - Asad Ali, Nawal Alsufyani, Sanaul Hoque, Farzin Deravi:
Gaze-based Presentation Attack Detection for Users Wearing Tinted Glasses. 1-5 - Kenneth Lai, Svetlana N. Yanushkevich:
Multi-Metric Evaluation of Thermal-to-Visual Face Recognition. 1-6 - Sudarsini Tekkam Gnanasekar, Svetlana N. Yanushkevich:
Face Attributes and Detection of Drug Addicts. 1-6 - Liliana Zisu:
Two, Three and Four Dimensional BB84: A Comparative Analysis Based on C# Simulation. 1-5 - Thomas Truong, Jonathan Graf, Svetlana N. Yanushkevich:
Hybrid Score- and Rank-Level Fusion for Person Identification using Face and ECG Data. 1-6 - P. Farkas:
Further Heuristic Discussion on Two Countermeasures against Reaction Attacks on McEliece Cryptosystems with QCLDPC Codes. 1-4 - Ramiro Sámano-Robles:
MAC-PRY Cross-Layer Design for Secure Wireless Avionics Intra-Communications. 1-7 - Jonathan Graf, Shawn Eastwood, Svetlana N. Yanushkevich, Reed Ferber:
Risk Inference Models for Security Applications. 1-6 - Charlie D. Frowd, Emma Portch, Abigail Killeen, Lydia Mullen, Alexander J. Martin, Peter J. B. Hancock:
EvoFIT Facial Composite Images: A Detailed Assessment of Impact on Forensic Practitioners, Police Investigators, Victims, Witnesses, Offenders and the Media. 1-7 - Hamed Alsufyani, Sanaul Hoque, Farzin Deravi:
Usability of Skin Texture Biometrics for Mixed-Resolution Images. 1-6 - Nicolas Ragot, Redouane Khemmar, Adithya Pokala, Romain Rossi, Jean-Yves Ertaud:
Benchmark of Visual SLAM Algorithms: ORB-SLAM2 vs RTAB-Map. 1-6 - Samuel D. Baba, Supriya Yadav, Gareth Howells:
SortAlgo-Metrics: Identification of Cloud-Based Server Via a Simple Algorithmic Analysis. 1-6 - Khattab M. Ali Alheeti, Muzhir Shaban Al-Ani, Klaus D. McDonald-Maier:
Spreading Code Identification of Legal Drones in IoT Environment. 1-6 - Saleh Mulhem, Mouadh Ayache, Wael Adi:
Mini-Block-Based Cipher Class for Physically Clone-Resistant Devices. 1-6 - O. Obi-Alago, Svetlana N. Yanushkevich, H. M. Wetherley:
Detecting Thermal Face Signature Abnormalities. 1-6 - Supriya Yadav, Gareth Howells:
Secure Device Identification Using Multidimensional Mapping. 1-5 - Audrey Ledoux, Ngoc Bich Dao, Paul Lahmi, Mickaël Coustaty:
Alphanumeric Glyphs Transformation Based on Shape Morphing: Context of Text. 1-6 - Shi Pan, Farzin Deravi:
Spatio-Temporal Texture Features for Presentation Attack Detection in Biometric Systems. 1-6 - Zhihao Chen, Redouane Khemmar, Benoit Decoux, Amphani Atahouet, Jean-Yves Ertaud:
Real Time Object Detection, Tracking, and Distance and Motion Estimation based on Deep Learning: Application to Smart Mobility. 1-6 - Amit Sardar, Bijoy Das, Dipanwita Roy Chowdhury:
An Efficient Hardware Design for Combined AES and AEGIS. 1-6 - Tasmina Islam, Michael C. Fairhurst:
Investigating the Effect of Writer Style, Age and Gender on Natural Revocability Analysis in Handwritten Signature Biometric. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.