Abstract is missing.
- An Efficient Hardware Design for Combined AES and AEGISAmit Sardar, Bijoy Das, Dipanwita Roy Chowdhury. 1-6 [doi]
- Mini-Block-Based Cipher Class for Physically Clone-Resistant DevicesSaleh Mulhem, Mouadh Ayache, Wael Adi. 1-6 [doi]
- Alphanumeric Glyphs Transformation Based on Shape Morphing: Context of TextAudrey Ledoux, Ngoc Bich Dao, Paul Lahmi, Mickaël Coustaty. 1-6 [doi]
- Multi-Metric Evaluation of Thermal-to-Visual Face RecognitionKenneth Lai, Svetlana N. Yanushkevich. 1-6 [doi]
- A Machine Learning Method For Sensor Authentication Using Hidden Markov ModelsJulian Murphy, Gareth Howells, Klaus D. McDonald-Maier. 1-5 [doi]
- Risk Inference Models for Security ApplicationsJonathan Graf, Shawn Eastwood, Svetlana N. Yanushkevich, Reed Ferber. 1-6 [doi]
- Detecting Thermal Face Signature AbnormalitiesO. Obi-Alago, Svetlana N. Yanushkevich, H. M. Wetherley. 1-6 [doi]
- Gaze-based Presentation Attack Detection for Users Wearing Tinted GlassesAsad Ali 0002, Nawal Alsufyani, Sanaul Hoque, Farzin Deravi. 1-5 [doi]
- SortAlgo-Metrics: Identification of Cloud-Based Server Via a Simple Algorithmic AnalysisSamuel D. Baba, Supriya Yadav, Gareth Howells. 1-6 [doi]
- Real Time Object Detection, Tracking, and Distance and Motion Estimation based on Deep Learning: Application to Smart MobilityZhihao Chen, Redouane Khemmar, Benoit Decoux, Amphani Atahouet, Jean-Yves Ertaud. 1-6 [doi]
- EvoFIT Facial Composite Images: A Detailed Assessment of Impact on Forensic Practitioners, Police Investigators, Victims, Witnesses, Offenders and the MediaCharlie D. Frowd, Emma Portch, Abigail Killeen, Lydia Mullen, Alexander J. Martin, Peter J. B. Hancock. 1-7 [doi]
- Hybrid Score- and Rank-Level Fusion for Person Identification using Face and ECG DataThomas Truong, Jonathan Graf, Svetlana N. Yanushkevich. 1-6 [doi]
- Two, Three and Four Dimensional BB84: A Comparative Analysis Based on C# SimulationZisu Liliana. 1-5 [doi]
- Spreading Code Identification of Legal Drones in IoT EnvironmentKhattab M. Ali Alheeti, Muzhir Shaban Al-Ani, Klaus D. McDonald-Maier. 1-6 [doi]
- MAC-PRY Cross-Layer Design for Secure Wireless Avionics Intra-CommunicationsRamiro Sámano-Robles. 1-7 [doi]
- Investigating the Effect of Writer Style, Age and Gender on Natural Revocability Analysis in Handwritten Signature BiometricTasmina Islam, Michael C. Fairhurst. 1-6 [doi]
- Face Attributes and Detection of Drug AddictsSudarsini Tekkam Gnanasekar, Svetlana N. Yanushkevich. 1-6 [doi]
- Further Heuristic Discussion on Two Countermeasures against Reaction Attacks on McEliece Cryptosystems with QCLDPC CodesP. Farkas. 1-4 [doi]
- Secure Device Identification Using Multidimensional MappingSupriya Yadav, Gareth Howells. 1-5 [doi]
- Spatio-Temporal Texture Features for Presentation Attack Detection in Biometric SystemsShi Pan, Farzin Deravi. 1-6 [doi]
- Benchmark of Visual SLAM Algorithms: ORB-SLAM2 vs RTAB-MapNicolas Ragot, Redouane Khemmar, Adithya Pokala, Romain Rossi, Jean-Yves Ertaud. 1-6 [doi]
- Usability of Skin Texture Biometrics for Mixed-Resolution ImagesHamed Alsufyani, Sanaul Hoque, Farzin Deravi. 1-6 [doi]