Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
publicationDateY_i : 2013
Image document

Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack

Andreas Hasselberg , Rene Zimmermann , Christian Kraetzer , Tobias Scheidat , Claus Vielhauer , et al.
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.85-94, ⟨10.1007/978-3-642-40779-6_6⟩
Conference papers hal-01492835v1
Image document

Trustworthy Software Development

Sachar Paulus , Nazila Gol Mohammadi , Thorsten Weyer
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.233-247, ⟨10.1007/978-3-642-40779-6_23⟩
Conference papers hal-01492828v1
Image document

Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications

Mario Hildebrandt , Jennifer Sturm , Jana Dittmann , Claus Vielhauer
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.204-206, ⟨10.1007/978-3-642-40779-6_19⟩
Conference papers hal-01492823v1