Filter your results
- 9
- 1
- 9
- 1
- 10
- 4
- 2
- 2
- 2
- 10
- 1
- 1
- 1
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
10 results
|
|
sorted by
|
|
Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.204-206, ⟨10.1007/978-3-642-40779-6_19⟩
Conference papers
hal-01492823v1
|
||
|
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.93-105, ⟨10.1007/978-3-642-13241-4_10⟩
Conference papers
hal-01056387v1
|
||
|
Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.89-98, ⟨10.1007/978-3-642-32805-3_7⟩
Conference papers
hal-01540887v1
|
||
|
Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.200-203, ⟨10.1007/978-3-642-40779-6_18⟩
Conference papers
hal-01492822v1
|
||
|
Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.16-25, ⟨10.1007/978-3-642-32805-3_2⟩
Conference papers
hal-01540894v1
|
||
|
Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.59-71, ⟨10.1007/978-3-642-24712-5_5⟩
Conference papers
hal-01596193v1
|
||
|
Security Warnings for Children’s Smart Phones: A First Design Approach12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.241-243, ⟨10.1007/978-3-642-24712-5_24⟩
Conference papers
hal-01596186v1
|
||
|
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.178-190, ⟨10.1007/978-3-642-13241-4_17⟩
Conference papers
hal-01056380v1
|
||
|
E-Learning of IT Security Threats: A Game Prototype for Children14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.162-172, ⟨10.1007/978-3-642-40779-6_14⟩
Conference papers
hal-01492818v1
|
||
|
Communications and Multimedia SecuritySpringer, LNCS-8099, 2013, Lecture Notes in Computer Science, 978-3-642-40778-9. ⟨10.1007/978-3-642-40779-6⟩
Books
hal-01492838v1
|