Search dblp for Publications

export results for "toc:db/conf/isbast/isbast2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/isbast/AhmedM13,
  author       = {Abdul Haseeb Ahmed and
                  Hafiz Malik},
  title        = {Security of Biometrics Using Multimodal Approach},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.24},
  doi          = {10.1109/ISBAST.2013.24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/AhmedM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/AlsaadeZA13,
  author       = {F. Alsaade and
                  M. Zahrani and
                  Turki Ali Alghamdi},
  title        = {Score-Level Fusion in Biometric Verification},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {193--197},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.34},
  doi          = {10.1109/ISBAST.2013.34},
  timestamp    = {Fri, 18 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/AlsaadeZA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/ChangCYH13,
  author       = {Po{-}Chun Chang and
                  Kuo{-}Liang Chung and
                  Wei{-}Ning Yang and
                  Yong{-}Huai Huang},
  title        = {Bitrate-Saving Intra Coding for Depth Video Compression in {H.264/MVC}
                  Based on {D-NOSE} Models},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.28},
  doi          = {10.1109/ISBAST.2013.28},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/ChangCYH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/ChangFJYK13,
  author       = {Chi{-}Kao Chang and
                  Min{-}Yuan Fang and
                  I{-}Chang Jou and
                  Nai{-}Chung Yang and
                  Chung{-}Ming Kuo},
  title        = {Subsampling Based Computation-Aware Motion Estimation},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {171--175},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.30},
  doi          = {10.1109/ISBAST.2013.30},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/ChangFJYK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/ChangTHYC13,
  author       = {Ing{-}Chau Chang and
                  Hung{-}Ta Tai and
                  Dung{-}Lin Hsieh and
                  Feng{-}Han Yeh and
                  Siao{-}Hui Chang},
  title        = {Design and Implementation of the Travelling Time- and Energy-Efficient
                  Android {GPS} Navigation App with the VANET-Based A* Route Planning
                  Algorithm},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {85--92},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.17},
  doi          = {10.1109/ISBAST.2013.17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/ChangTHYC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/ChenCHW13,
  author       = {Ding{-}Horng Chen and
                  Yi{-}Chen Chang and
                  Pai{-}Jun Huang and
                  Chia{-}Hung Wei},
  title        = {The Correlation Analysis between Breast Density and Cancer Risk Factor
                  in Breast {MRI} Images},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {72--76},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.14},
  doi          = {10.1109/ISBAST.2013.14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/ChenCHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/ChenCLH13,
  author       = {Rong{-}Jian Chen and
                  Yu{-}Cha Chen and
                  Jui{-}Lin Lai and
                  Shi{-}Jinn Horng},
  title        = {Data Hiding Using Flexible Multi-bit {MER}},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {24--31},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.7},
  doi          = {10.1109/ISBAST.2013.7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/ChenCLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/ChenHG13,
  author       = {Yanling Chen and
                  E. Heimark and
                  Danilo Gligoroski},
  title        = {Personal Threshold in a Small Scale Text-Dependent Speaker Recognition},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {162--170},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.29},
  doi          = {10.1109/ISBAST.2013.29},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/ChenHG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/ChenLW13,
  author       = {Yi{-}Hui Chen and
                  Eric Jui{-}Lin Lu and
                  Tsai{-}Ying Wu},
  title        = {A Blog Clustering Approach Based on Queried Keywords},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.3},
  doi          = {10.1109/ISBAST.2013.3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/ChenLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/ChenTT13,
  author       = {Chyouhwa Chen and
                  Po{-}Chung Tung and
                  Wei{-}Chung Teng},
  title        = {Exploiting Unsupervised Learning in Publish Subscribe System Design},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {32--39},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.8},
  doi          = {10.1109/ISBAST.2013.8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/ChenTT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/ChiangYC13,
  author       = {Johannes K. Chiang and
                  Eric H.{-}W. Yen and
                  Yen{-}Hua Chen},
  title        = {Authentication, Authorization and File Synchronization in Hybrid Cloud:
                  On Case of Google Docs, Hadoop and Linux Local Hosts},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {116--123},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.22},
  doi          = {10.1109/ISBAST.2013.22},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/ChiangYC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/ChiangYL13,
  author       = {Johannes K. Chiang and
                  Eric Yen and
                  Yu{-}Long Lin},
  title        = {On Interoperation of Hybrid Cloud},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {111--115},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.21},
  doi          = {10.1109/ISBAST.2013.21},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/ChiangYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/HenzlH13,
  author       = {Martin Henzl and
                  Petr Han{\'{a}}cek},
  title        = {Modeling of Contactless Smart Card Protocols and Automated Vulnerability
                  Finding},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.26},
  doi          = {10.1109/ISBAST.2013.26},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/HenzlH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/HossainR13,
  author       = {M. Anwar Hossain and
                  Sk. Md. Mizanur Rahman},
  title        = {Towards Privacy Preserving Multimedia Surveillance System: {A} Secure
                  Privacy Vault Design},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {280--285},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.49},
  doi          = {10.1109/ISBAST.2013.49},
  timestamp    = {Tue, 23 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/HossainR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/HsuCT13,
  author       = {Tz{-}Heng Hsu and
                  Ding{-}Horng Chen and
                  Yi{-}Hsing Tung},
  title        = {A Geocasting Forwarding Scheme for Mobile Nodes in VANETs},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {77--81},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.15},
  doi          = {10.1109/ISBAST.2013.15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/HsuCT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/HsuHFCWG13,
  author       = {Ling{-}Yuan Hsu and
                  Shi{-}Jinn Horng and
                  Pingzhi Fan and
                  Hsien{-}Hsin Chou and
                  Xian Wang and
                  Minyi Guo},
  title        = {Adaptive Non-Local Means for Image Denoising using Turbulent {PSO}
                  with No-Reference Measures},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {251--258},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.45},
  doi          = {10.1109/ISBAST.2013.45},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/HsuHFCWG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/KangSZP13,
  author       = {Jianhua Kang and
                  Fangyi She and
                  Weidong Zhang and
                  Jie Ping},
  title        = {Application of Network Analyzer Based on the Automatic Control of
                  LabVIEW in Radio and Television Test},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {14--19},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.5},
  doi          = {10.1109/ISBAST.2013.5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/KangSZP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/Kao13,
  author       = {Chi{-}Chou Kao},
  title        = {E-Health Design of {EEG} Signal Classification for Epilepsy Diagnosis},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {67--71},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.13},
  doi          = {10.1109/ISBAST.2013.13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/Kao13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/KumariMKK13,
  author       = {Saru Kumari and
                  Fahad Bin Muhaya and
                  Muhammad Khurram Khan and
                  R. Kumar},
  title        = {Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication
                  Scheme"},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {247--250},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.43},
  doi          = {10.1109/ISBAST.2013.43},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/KumariMKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/KurniawanKK13,
  author       = {Fajri Kurniawan and
                  Mohammed Sayim Khalil and
                  Muhammad Khurram Khan},
  title        = {Core-Point Detection on Camera-Based Fingerprint Image},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {241--246},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.42},
  doi          = {10.1109/ISBAST.2013.42},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/KurniawanKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/KurniawanKKA13,
  author       = {Fajri Kurniawan and
                  Mohammed Sayim Khalil and
                  Muhammad Khurram Khan and
                  Yasser M. Alginahi},
  title        = {Authentication and Tamper Detection of Digital Holy Quran Images},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {291--296},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.51},
  doi          = {10.1109/ISBAST.2013.51},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/KurniawanKKA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LaiLLC13,
  author       = {Jui{-}Lin Lai and
                  Kuo{-}Hung Liao and
                  Yi{-}Te Lai and
                  Rong{-}Jian Chen},
  title        = {Design {CAROM} Module Used in {AES} Structure for Sub-byte and Inv-sub-byte
                  Transformation},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {198--202},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.35},
  doi          = {10.1109/ISBAST.2013.35},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/LaiLLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LeeHK13,
  author       = {Jiann{-}Shu Lee and
                  Fei{-}Hsiang Huang and
                  Hsiao{-}Chen Kuo},
  title        = {A New Image Watermarking Scheme Using Non-dominated Sorting Genetic
                  Algorithm {II}},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {56--61},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.11},
  doi          = {10.1109/ISBAST.2013.11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/LeeHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LengTLK13,
  author       = {Lu Leng and
                  Andrew Beng Jin Teoh and
                  Ming Li and
                  Muhammad Khurram Khan},
  title        = {Orientation Range for Transposition According to the Correlation Analysis
                  of 2DPalmHash Code},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {230--234},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.40},
  doi          = {10.1109/ISBAST.2013.40},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/LengTLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LiNKL13,
  author       = {Xiong Li and
                  Jianwei Niu and
                  Muhammad Khurram Khan and
                  Junguo Liao},
  title        = {Robust Biometrics Based Three-Factor Remote User Authentication Scheme
                  with Key Agreement},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {105--110},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.20},
  doi          = {10.1109/ISBAST.2013.20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/LiNKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LiNKL13a,
  author       = {Xiong Li and
                  Jianwei Niu and
                  Muhammad Khurram Khan and
                  Junguo Liao},
  title        = {Security Analysis and Enhancement of a Dynamic Identity Based Authentication
                  Scheme Using Smart Cards},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.27},
  doi          = {10.1109/ISBAST.2013.27},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/LiNKL13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LiaoLCLL13,
  author       = {Wei{-}Ting Liao and
                  Wen{-}Yen Lin and
                  Wen{-}Cheng Cheng and
                  Kin Fong Lei and
                  Ming{-}Yih Lee},
  title        = {Precision Enhancement and Performance Evaluation of a CORDIC-Based
                  Tilting Angle Identification Algorithm for Three-Axis Accelerometers},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {187--192},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.33},
  doi          = {10.1109/ISBAST.2013.33},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isbast/LiaoLCLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LinCL13,
  author       = {Chien{-}Cheng Lin and
                  Chin{-}Chun Chang and
                  Deron Liang},
  title        = {A Novel Non-intrusive User Authentication Method Based on Touchscreen
                  of Smartphones},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {212--216},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.37},
  doi          = {10.1109/ISBAST.2013.37},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/LinCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LinLC13,
  author       = {Shinfeng D. Lin and
                  Jia{-}Jen Lin and
                  Chin{-}Yao Chung},
  title        = {Sleepy Eye's Recognition for Drowsiness Detection},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {176--179},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.31},
  doi          = {10.1109/ISBAST.2013.31},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/LinLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LinY13,
  author       = {Jyhjong Lin and
                  Shin{-}Jer Yang},
  title        = {An Architecture and Application of Cloud-Based Customer Knowledge
                  Management Information Systems},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {267--272},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.47},
  doi          = {10.1109/ISBAST.2013.47},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/LinY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LuKD13,
  author       = {Nan{-}Han Lu and
                  Chung{-}Ming Kuo and
                  Hueisch{-}Jy Ding},
  title        = {Automatic {ROI} Segmentation in B-Mode Ultrasound Image for Liver
                  Fibrosis Classification},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {10--13},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.4},
  doi          = {10.1109/ISBAST.2013.4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/LuKD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LuoYY13,
  author       = {Jia{-}Ning Luo and
                  Ming{-}Hour Yang and
                  Ming{-}Chien Yang},
  title        = {An Anonymous Car Rental System Based on {NFC}},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.19},
  doi          = {10.1109/ISBAST.2013.19},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isbast/LuoYY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/NoorA13,
  author       = {Muzzamil Noor and
                  Haider Abbas},
  title        = {Anticipating Dormant Functionality in Malware: {A} Semantics Based
                  Approach},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {20--23},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.6},
  doi          = {10.1109/ISBAST.2013.6},
  timestamp    = {Wed, 20 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/NoorA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/SuCC13,
  author       = {Chun{-}Rong Su and
                  Jiann{-}Jone Chen and
                  Kai{-}Lin Chang},
  title        = {Content-Based Image Retrieval on Reconfigurable Peer-to-Peer Networks},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {203--211},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.36},
  doi          = {10.1109/ISBAST.2013.36},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/SuCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/TaiHC13,
  author       = {Chih{-}Hua Tai and
                  Jen{-}Wei Huang and
                  Meng{-}Hao Chung},
  title        = {Privacy Preserving Frequent Pattern Mining on Multi-cloud Environment},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {235--240},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.41},
  doi          = {10.1109/ISBAST.2013.41},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isbast/TaiHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/TsaiLW13,
  author       = {Jia{-}Lun Tsai and
                  Nai{-}Wei Lo and
                  Tzong{-}Chen Wu},
  title        = {New Identity-Based Sequential Aggregate Signature Scheme from {RSA}},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.25},
  doi          = {10.1109/ISBAST.2013.25},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/TsaiLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/UsmaniIAM13,
  author       = {Zeeshan{-}ul{-}hassan Usmani and
                  Sarah Irum and
                  Hassan Afzal and
                  S. Mahmud},
  title        = {How to Build an Automated Fingerprint Identification System},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {40--47},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.9},
  doi          = {10.1109/ISBAST.2013.9},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isbast/UsmaniIAM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/UsmaniIAM13a,
  author       = {Zeeshan{-}ul{-}hassan Usmani and
                  Sarah Irum and
                  Hassan Afzal and
                  S. Mahmud},
  title        = {Plug-n-Play {AFIS} Development for Criminal and Civil Applications},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {48--55},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.10},
  doi          = {10.1109/ISBAST.2013.10},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isbast/UsmaniIAM13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/WanY13,
  author       = {Shaohua Wan and
                  Hua Yang},
  title        = {Comparison among Methods of Ensemble Learning},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {286--290},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.50},
  doi          = {10.1109/ISBAST.2013.50},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isbast/WanY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/WangL13,
  author       = {Ping{-}Chin Wang and
                  Chow{-}Sing Lin},
  title        = {Enhanced Backward Error Concealment for {H.264/AVC} Videos on Error-Prone
                  Networks},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {62--66},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.12},
  doi          = {10.1109/ISBAST.2013.12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/WangL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/WangLEYN13,
  author       = {Ning Wang and
                  Qiong Li and
                  Ahmed A. Abd El{-}Latif and
                  Xuehu Yan and
                  Xiamu Niu},
  title        = {A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible
                  and Thermal Face Images},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {217--223},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.38},
  doi          = {10.1109/ISBAST.2013.38},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/WangLEYN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/WuW13,
  author       = {Hanzhou Wu and
                  Hongxia Wang},
  title        = {Multibit Color-Mapping Steganography Using Depth-First Search},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {224--229},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.39},
  doi          = {10.1109/ISBAST.2013.39},
  timestamp    = {Wed, 05 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/WuW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/XieBDHW13,
  author       = {Qi Xie and
                  Mengjie Bao and
                  Na Dong and
                  Bin Hu and
                  Duncan S. Wong},
  title        = {Secure Mobile User Authentication and Key Agreement Protocol with
                  Privacy Protection in Global Mobility Networks},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.23},
  doi          = {10.1109/ISBAST.2013.23},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/XieBDHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/YangL13,
  author       = {Ching{-}Nung Yang and
                  Jia{-}Bin Lai},
  title        = {Protecting Data Privacy and Security for Cloud Computing Based on
                  Secret Sharing},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {259--266},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.46},
  doi          = {10.1109/ISBAST.2013.46},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/YangL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/YangLL13,
  author       = {Shin{-}Jer Yang and
                  Pei{-}Ci Lai and
                  Jyhjong Lin},
  title        = {Design Role-Based Multi-tenancy Access Control Scheme for Cloud Services},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {273--279},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.48},
  doi          = {10.1109/ISBAST.2013.48},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/YangLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/YangWL13,
  author       = {Wu{-}Chuan Yang and
                  Shyh{-}Yih Wang and
                  Shu{-}Ling Liu},
  title        = {Efficient Implementation of Block Cipher in {JCA}},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {82--84},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.16},
  doi          = {10.1109/ISBAST.2013.16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/YangWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/YinLL13,
  author       = {Zong{-}Xian Yin and
                  Chyi{-}Her Lin and
                  Wei{-}Cheng Lin},
  title        = {Interactive Multimedia Technology in Case-Based Medical E-Learning},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {93--96},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.18},
  doi          = {10.1109/ISBAST.2013.18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/YinLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/ZhangWPL13,
  author       = {Junbo Zhang and
                  Jian{-}Syuan Wong and
                  Yi Pan and
                  Tianrui Li},
  title        = {{H2T:} {A} Simple Hadoop-to-Twister Translator for Cloud Computing},
  booktitle    = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  pages        = {180--186},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISBAST.2013.32},
  doi          = {10.1109/ISBAST.2013.32},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/ZhangWPL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isbast/2013,
  title        = {International Symposium on Biometrics and Security Technologies, {ISBAST}
                  2013, 2-5 July, 2013, Chengdu, Sichuan, China},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6597099/proceeding},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics