IEEE Spectrum
Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Identity Authentication Using Fingerprints
AVBPA '97 Proceedings of the First International Conference on Audio- and Video-Based Biometric Person Authentication
Communications of the ACM - How the virtual inspires the real
Recent Advances in Fingerprint Verification
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Technology and Health Care
Biometrics break-ins and band-aids
Pattern Recognition Letters - Special issue: Audio- and video-based biometric person authentication (AVBPA 2001)
Recognition of Cursive Roman Handwriting - Past, Present and Future
ICDAR '03 Proceedings of the Seventh International Conference on Document Analysis and Recognition - Volume 1
Improvements on the linear discrimination technique with application to face recognition
Pattern Recognition Letters
Biometric identification systems
Signal Processing
Digital signature: use and modification to achieve success in next generational e-business processes
Information and Management
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Authentication using graphical passwords: effects of tolerance and image choice
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
The trouble with login: on usability and computer security in ubiquitous computing
Personal and Ubiquitous Computing
Spy-resistant keyboard: more secure password entry on public touch screen displays
OZCHI '05 Proceedings of the 17th Australia conference on Computer-Human Interaction: Citizens Online: Considerations for Today and the Future
A database security course on a shoestring
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Biometric marketing: targeting the online consumer
Communications of the ACM - Music information retrieval
Dynamic registration selection for fingerprint verification
Pattern Recognition
Hierarchical contour matching for dental X-ray radiographs
Pattern Recognition
Coarse fingerprint registration using orientation fields
EURASIP Journal on Applied Signal Processing
Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence
International Journal of Electronic Commerce
Enhanced password authentication through keystroke typing characteristics
AIAP'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: artificial intelligence and applications
An Efficient Multimodal 2D-3D Hybrid Approach to Automatic Face Recognition
IEEE Transactions on Pattern Analysis and Machine Intelligence
Embedded biometric data for a secure authentication watermarking
SPPR'07 Proceedings of the Fourth conference on IASTED International Conference: Signal Processing, Pattern Recognition, and Applications
Fuzzy and Markov models for keystroke biometrics authentication
SMO'07 Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization
Understanding user perspectives on biometric technology
Communications of the ACM - Enterprise information integration: and other tools for merging data
Keystroke Dynamics for Biometrics Identification
ICANNGA '07 Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II
User Technology Readiness Measurement in Fingerprint Adoption at Higher Education Institution
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
Biometrics --- How to Put to Use and How Not at All?
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Hand Geometry Verification Using Time Series Representation
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
A novel software key container in on-line media services
Computers and Electrical Engineering
Planning with Uncertainty in Action Outcomes as Linear Programming Problem
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part II: Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living
Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part II
SMO'09 Proceedings of the 9th WSEAS international conference on Simulation, modelling and optimization
3D face recognition with sparse spherical representations
Pattern Recognition
Embedded biometric data for a secure authentication watermarking
SPPRA '07 Proceedings of the Fourth IASTED International Conference on Signal Processing, Pattern Recognition, and Applications
Information security underlying transparent computing: Impacts, visions and challenges
Web Intelligence and Agent Systems
Classification and numbering of teeth in dental bitewing images
Pattern Recognition
A system for human identification from X-ray dental radiographs
Pattern Recognition
A set of novel features for writer identification
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Biometric digital key mechanisms for telebiometric authentication based on biometric certificate
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
Biometric digital signature key generation and cryptography communication based on fingerprint
FAW'07 Proceedings of the 1st annual international conference on Frontiers in algorithmics
Support vector machines for inhabitant identification in smart houses
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Securing tests in E-learning environment
Proceedings of the 2011 International Conference on Communication, Computing & Security
ICSR'10 Proceedings of the Second international conference on Social robotics
Ear recognition by using neural networks
MMACTEE'09 Proceedings of the 11th WSEAS international conference on Mathematical methods and computational techniques in electrical engineering
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
Bubble trouble: off-line de-anonymization of bubble forms
SEC'11 Proceedings of the 20th USENIX conference on Security
Inhabitant prediction in smart houses
Proceedings of the 2011 international workshop on Situation activity & goal awareness
Biometric access control in the workplace: benefit or bind?
International Journal of Information Technology and Management
Nonparametric fingerprint deformation modelling
CAIP'05 Proceedings of the 11th international conference on Computer Analysis of Images and Patterns
Multi-modal biometrics with PKIs for border control applications
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
User identification using user’s walking pattern over the ubiFloorII
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
Correlation filters for facial recognition login access control
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part I
Security in context: investigating the impact of context on attitudes towards biometric technology
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
Multi-modal biometrics with PKI technologies for border control applications
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Text-dependent writer identification for Arabic handwriting
Journal of Electrical and Computer Engineering
Progressive authentication: deciding when to authenticate on mobile phones
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Next generation biometric security system: an approach for mobile device security
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
A multi-resolution multi-classifier system for speaker verification
Expert Systems: The Journal of Knowledge Engineering
Video-passwords: advertising while authenticating
Proceedings of the 2012 workshop on New security paradigms
Goals and Practices in Maintaining Information Systems Security
International Journal of Information Security and Privacy
Typing Biometric Keypads: Combining Keystroke Time and Pressure Features to Improve Authentication
Journal of Organizational and End User Computing
Hardware acceleration of retinal blood vasculature segmentation
Proceedings of the 23rd ACM international conference on Great lakes symposium on VLSI
Hi-index | 48.22 |