Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/isbast/isbast2013.bht:"
@inproceedings{DBLP:conf/isbast/AhmedM13, author = {Abdul Haseeb Ahmed and Hafiz Malik}, title = {Security of Biometrics Using Multimodal Approach}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.24}, doi = {10.1109/ISBAST.2013.24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/AhmedM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/AlsaadeZA13, author = {F. Alsaade and M. Zahrani and Turki Ali Alghamdi}, title = {Score-Level Fusion in Biometric Verification}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {193--197}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.34}, doi = {10.1109/ISBAST.2013.34}, timestamp = {Fri, 18 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/AlsaadeZA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/ChangCYH13, author = {Po{-}Chun Chang and Kuo{-}Liang Chung and Wei{-}Ning Yang and Yong{-}Huai Huang}, title = {Bitrate-Saving Intra Coding for Depth Video Compression in {H.264/MVC} Based on {D-NOSE} Models}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.28}, doi = {10.1109/ISBAST.2013.28}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/ChangCYH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/ChangFJYK13, author = {Chi{-}Kao Chang and Min{-}Yuan Fang and I{-}Chang Jou and Nai{-}Chung Yang and Chung{-}Ming Kuo}, title = {Subsampling Based Computation-Aware Motion Estimation}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {171--175}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.30}, doi = {10.1109/ISBAST.2013.30}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/ChangFJYK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/ChangTHYC13, author = {Ing{-}Chau Chang and Hung{-}Ta Tai and Dung{-}Lin Hsieh and Feng{-}Han Yeh and Siao{-}Hui Chang}, title = {Design and Implementation of the Travelling Time- and Energy-Efficient Android {GPS} Navigation App with the VANET-Based A* Route Planning Algorithm}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {85--92}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.17}, doi = {10.1109/ISBAST.2013.17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/ChangTHYC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/ChenCHW13, author = {Ding{-}Horng Chen and Yi{-}Chen Chang and Pai{-}Jun Huang and Chia{-}Hung Wei}, title = {The Correlation Analysis between Breast Density and Cancer Risk Factor in Breast {MRI} Images}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {72--76}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.14}, doi = {10.1109/ISBAST.2013.14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/ChenCHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/ChenCLH13, author = {Rong{-}Jian Chen and Yu{-}Cha Chen and Jui{-}Lin Lai and Shi{-}Jinn Horng}, title = {Data Hiding Using Flexible Multi-bit {MER}}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {24--31}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.7}, doi = {10.1109/ISBAST.2013.7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/ChenCLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/ChenHG13, author = {Yanling Chen and E. Heimark and Danilo Gligoroski}, title = {Personal Threshold in a Small Scale Text-Dependent Speaker Recognition}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {162--170}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.29}, doi = {10.1109/ISBAST.2013.29}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/ChenHG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/ChenLW13, author = {Yi{-}Hui Chen and Eric Jui{-}Lin Lu and Tsai{-}Ying Wu}, title = {A Blog Clustering Approach Based on Queried Keywords}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {1--9}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.3}, doi = {10.1109/ISBAST.2013.3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/ChenLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/ChenTT13, author = {Chyouhwa Chen and Po{-}Chung Tung and Wei{-}Chung Teng}, title = {Exploiting Unsupervised Learning in Publish Subscribe System Design}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {32--39}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.8}, doi = {10.1109/ISBAST.2013.8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/ChenTT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/ChiangYC13, author = {Johannes K. Chiang and Eric H.{-}W. Yen and Yen{-}Hua Chen}, title = {Authentication, Authorization and File Synchronization in Hybrid Cloud: On Case of Google Docs, Hadoop and Linux Local Hosts}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {116--123}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.22}, doi = {10.1109/ISBAST.2013.22}, timestamp = {Tue, 28 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/ChiangYC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/ChiangYL13, author = {Johannes K. Chiang and Eric Yen and Yu{-}Long Lin}, title = {On Interoperation of Hybrid Cloud}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {111--115}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.21}, doi = {10.1109/ISBAST.2013.21}, timestamp = {Tue, 28 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/ChiangYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/HenzlH13, author = {Martin Henzl and Petr Han{\'{a}}cek}, title = {Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.26}, doi = {10.1109/ISBAST.2013.26}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/HenzlH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/HossainR13, author = {M. Anwar Hossain and Sk. Md. Mizanur Rahman}, title = {Towards Privacy Preserving Multimedia Surveillance System: {A} Secure Privacy Vault Design}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {280--285}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.49}, doi = {10.1109/ISBAST.2013.49}, timestamp = {Tue, 23 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/HossainR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/HsuCT13, author = {Tz{-}Heng Hsu and Ding{-}Horng Chen and Yi{-}Hsing Tung}, title = {A Geocasting Forwarding Scheme for Mobile Nodes in VANETs}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {77--81}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.15}, doi = {10.1109/ISBAST.2013.15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/HsuCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/HsuHFCWG13, author = {Ling{-}Yuan Hsu and Shi{-}Jinn Horng and Pingzhi Fan and Hsien{-}Hsin Chou and Xian Wang and Minyi Guo}, title = {Adaptive Non-Local Means for Image Denoising using Turbulent {PSO} with No-Reference Measures}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {251--258}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.45}, doi = {10.1109/ISBAST.2013.45}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/HsuHFCWG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/KangSZP13, author = {Jianhua Kang and Fangyi She and Weidong Zhang and Jie Ping}, title = {Application of Network Analyzer Based on the Automatic Control of LabVIEW in Radio and Television Test}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {14--19}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.5}, doi = {10.1109/ISBAST.2013.5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/KangSZP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/Kao13, author = {Chi{-}Chou Kao}, title = {E-Health Design of {EEG} Signal Classification for Epilepsy Diagnosis}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {67--71}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.13}, doi = {10.1109/ISBAST.2013.13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/Kao13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/KumariMKK13, author = {Saru Kumari and Fahad Bin Muhaya and Muhammad Khurram Khan and R. Kumar}, title = {Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme"}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {247--250}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.43}, doi = {10.1109/ISBAST.2013.43}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/KumariMKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/KurniawanKK13, author = {Fajri Kurniawan and Mohammed Sayim Khalil and Muhammad Khurram Khan}, title = {Core-Point Detection on Camera-Based Fingerprint Image}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {241--246}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.42}, doi = {10.1109/ISBAST.2013.42}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/KurniawanKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/KurniawanKKA13, author = {Fajri Kurniawan and Mohammed Sayim Khalil and Muhammad Khurram Khan and Yasser M. Alginahi}, title = {Authentication and Tamper Detection of Digital Holy Quran Images}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {291--296}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.51}, doi = {10.1109/ISBAST.2013.51}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/KurniawanKKA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LaiLLC13, author = {Jui{-}Lin Lai and Kuo{-}Hung Liao and Yi{-}Te Lai and Rong{-}Jian Chen}, title = {Design {CAROM} Module Used in {AES} Structure for Sub-byte and Inv-sub-byte Transformation}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {198--202}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.35}, doi = {10.1109/ISBAST.2013.35}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/LaiLLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LeeHK13, author = {Jiann{-}Shu Lee and Fei{-}Hsiang Huang and Hsiao{-}Chen Kuo}, title = {A New Image Watermarking Scheme Using Non-dominated Sorting Genetic Algorithm {II}}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {56--61}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.11}, doi = {10.1109/ISBAST.2013.11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/LeeHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LengTLK13, author = {Lu Leng and Andrew Beng Jin Teoh and Ming Li and Muhammad Khurram Khan}, title = {Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {230--234}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.40}, doi = {10.1109/ISBAST.2013.40}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/LengTLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LiNKL13, author = {Xiong Li and Jianwei Niu and Muhammad Khurram Khan and Junguo Liao}, title = {Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key Agreement}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {105--110}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.20}, doi = {10.1109/ISBAST.2013.20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/LiNKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LiNKL13a, author = {Xiong Li and Jianwei Niu and Muhammad Khurram Khan and Junguo Liao}, title = {Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart Cards}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.27}, doi = {10.1109/ISBAST.2013.27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/LiNKL13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LiaoLCLL13, author = {Wei{-}Ting Liao and Wen{-}Yen Lin and Wen{-}Cheng Cheng and Kin Fong Lei and Ming{-}Yih Lee}, title = {Precision Enhancement and Performance Evaluation of a CORDIC-Based Tilting Angle Identification Algorithm for Three-Axis Accelerometers}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {187--192}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.33}, doi = {10.1109/ISBAST.2013.33}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isbast/LiaoLCLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LinCL13, author = {Chien{-}Cheng Lin and Chin{-}Chun Chang and Deron Liang}, title = {A Novel Non-intrusive User Authentication Method Based on Touchscreen of Smartphones}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {212--216}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.37}, doi = {10.1109/ISBAST.2013.37}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/LinCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LinLC13, author = {Shinfeng D. Lin and Jia{-}Jen Lin and Chin{-}Yao Chung}, title = {Sleepy Eye's Recognition for Drowsiness Detection}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {176--179}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.31}, doi = {10.1109/ISBAST.2013.31}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/LinLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LinY13, author = {Jyhjong Lin and Shin{-}Jer Yang}, title = {An Architecture and Application of Cloud-Based Customer Knowledge Management Information Systems}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {267--272}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.47}, doi = {10.1109/ISBAST.2013.47}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/LinY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LuKD13, author = {Nan{-}Han Lu and Chung{-}Ming Kuo and Hueisch{-}Jy Ding}, title = {Automatic {ROI} Segmentation in B-Mode Ultrasound Image for Liver Fibrosis Classification}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {10--13}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.4}, doi = {10.1109/ISBAST.2013.4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/LuKD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LuoYY13, author = {Jia{-}Ning Luo and Ming{-}Hour Yang and Ming{-}Chien Yang}, title = {An Anonymous Car Rental System Based on {NFC}}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.19}, doi = {10.1109/ISBAST.2013.19}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isbast/LuoYY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/NoorA13, author = {Muzzamil Noor and Haider Abbas}, title = {Anticipating Dormant Functionality in Malware: {A} Semantics Based Approach}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {20--23}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.6}, doi = {10.1109/ISBAST.2013.6}, timestamp = {Wed, 20 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/NoorA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/SuCC13, author = {Chun{-}Rong Su and Jiann{-}Jone Chen and Kai{-}Lin Chang}, title = {Content-Based Image Retrieval on Reconfigurable Peer-to-Peer Networks}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {203--211}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.36}, doi = {10.1109/ISBAST.2013.36}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/SuCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/TaiHC13, author = {Chih{-}Hua Tai and Jen{-}Wei Huang and Meng{-}Hao Chung}, title = {Privacy Preserving Frequent Pattern Mining on Multi-cloud Environment}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {235--240}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.41}, doi = {10.1109/ISBAST.2013.41}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isbast/TaiHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/TsaiLW13, author = {Jia{-}Lun Tsai and Nai{-}Wei Lo and Tzong{-}Chen Wu}, title = {New Identity-Based Sequential Aggregate Signature Scheme from {RSA}}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.25}, doi = {10.1109/ISBAST.2013.25}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/TsaiLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/UsmaniIAM13, author = {Zeeshan{-}ul{-}hassan Usmani and Sarah Irum and Hassan Afzal and S. Mahmud}, title = {How to Build an Automated Fingerprint Identification System}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {40--47}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.9}, doi = {10.1109/ISBAST.2013.9}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isbast/UsmaniIAM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/UsmaniIAM13a, author = {Zeeshan{-}ul{-}hassan Usmani and Sarah Irum and Hassan Afzal and S. Mahmud}, title = {Plug-n-Play {AFIS} Development for Criminal and Civil Applications}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {48--55}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.10}, doi = {10.1109/ISBAST.2013.10}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isbast/UsmaniIAM13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/WanY13, author = {Shaohua Wan and Hua Yang}, title = {Comparison among Methods of Ensemble Learning}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {286--290}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.50}, doi = {10.1109/ISBAST.2013.50}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isbast/WanY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/WangL13, author = {Ping{-}Chin Wang and Chow{-}Sing Lin}, title = {Enhanced Backward Error Concealment for {H.264/AVC} Videos on Error-Prone Networks}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {62--66}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.12}, doi = {10.1109/ISBAST.2013.12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/WangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/WangLEYN13, author = {Ning Wang and Qiong Li and Ahmed A. Abd El{-}Latif and Xuehu Yan and Xiamu Niu}, title = {A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face Images}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {217--223}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.38}, doi = {10.1109/ISBAST.2013.38}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/WangLEYN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/WuW13, author = {Hanzhou Wu and Hongxia Wang}, title = {Multibit Color-Mapping Steganography Using Depth-First Search}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {224--229}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.39}, doi = {10.1109/ISBAST.2013.39}, timestamp = {Wed, 05 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/WuW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/XieBDHW13, author = {Qi Xie and Mengjie Bao and Na Dong and Bin Hu and Duncan S. Wong}, title = {Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.23}, doi = {10.1109/ISBAST.2013.23}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/XieBDHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/YangL13, author = {Ching{-}Nung Yang and Jia{-}Bin Lai}, title = {Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {259--266}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.46}, doi = {10.1109/ISBAST.2013.46}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/YangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/YangLL13, author = {Shin{-}Jer Yang and Pei{-}Ci Lai and Jyhjong Lin}, title = {Design Role-Based Multi-tenancy Access Control Scheme for Cloud Services}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {273--279}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.48}, doi = {10.1109/ISBAST.2013.48}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/YangLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/YangWL13, author = {Wu{-}Chuan Yang and Shyh{-}Yih Wang and Shu{-}Ling Liu}, title = {Efficient Implementation of Block Cipher in {JCA}}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {82--84}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.16}, doi = {10.1109/ISBAST.2013.16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/YangWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/YinLL13, author = {Zong{-}Xian Yin and Chyi{-}Her Lin and Wei{-}Cheng Lin}, title = {Interactive Multimedia Technology in Case-Based Medical E-Learning}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {93--96}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.18}, doi = {10.1109/ISBAST.2013.18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/YinLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/ZhangWPL13, author = {Junbo Zhang and Jian{-}Syuan Wong and Yi Pan and Tianrui Li}, title = {{H2T:} {A} Simple Hadoop-to-Twister Translator for Cloud Computing}, booktitle = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, pages = {180--186}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISBAST.2013.32}, doi = {10.1109/ISBAST.2013.32}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/ZhangWPL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isbast/2013, title = {International Symposium on Biometrics and Security Technologies, {ISBAST} 2013, 2-5 July, 2013, Chengdu, Sichuan, China}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6597099/proceeding}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.