Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/wifs/wifs2010.bht:"
@inproceedings{DBLP:conf/wifs/0001TS10, author = {Peter A. Johnson and Bozhao Tan and Stephanie Schuckers}, title = {Multimodal fusion vulnerability to non-zero effort (spoof) imposters}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711469}, doi = {10.1109/WIFS.2010.5711469}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/0001TS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/AdityaCSMG10, author = {Telidevara Aditya and Venkatachalam Chandrasekaran and Avinash Srinivasan and Ravi Mukkamala and Sandeep Gampa}, title = {Similarity coefficient generators for network forensics}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711462}, doi = {10.1109/WIFS.2010.5711462}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/AdityaCSMG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/AdjerohCPR10, author = {Donald A. Adjeroh and Deng Cao and Marco Piccirilli and Arun Ross}, title = {Predictability and correlation in human metrology}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711470}, doi = {10.1109/WIFS.2010.5711470}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/AdjerohCPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/AndaloTG10, author = {Fernanda A. Andal{\'{o}} and Gabriel Taubin and Siome Goldenstein}, title = {Detecting vanishing points by segment clustering on the projective plane for single-view photogrammetry}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711453}, doi = {10.1109/WIFS.2010.5711453}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/AndaloTG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BarniGL10, author = {Mauro Barni and Jorge Guajardo and Riccardo Lazzeretti}, title = {Privacy preserving evaluation of signal quality with application to {ECG} analysis}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711460}, doi = {10.1109/WIFS.2010.5711460}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BarniGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BendaleB10, author = {Abhijit Bendale and Terrance E. Boult}, title = {id-Privacy in large scale biometric systems}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711439}, doi = {10.1109/WIFS.2010.5711439}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BendaleB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BuhanGK10, author = {Ileana Buhan and Jorge Guajardo and Emile Kelkboom}, title = {Efficient strategies to play the indistinguishability game for fuzzy sketches}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711473}, doi = {10.1109/WIFS.2010.5711473}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/BuhanGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/CaldelliAPI10, author = {Roberto Caldelli and Irene Amerini and Francesco Picchioni and Matteo Innocenti}, title = {Fast image clustering of unknown source images}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711454}, doi = {10.1109/WIFS.2010.5711454}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/CaldelliAPI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ChristleinRA10, author = {Vincent Christlein and Christian Riess and Elli Angelopoulou}, title = {On rotation invariance in copy-move forgery detection}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711472}, doi = {10.1109/WIFS.2010.5711472}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ChristleinRA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Chuang010, author = {Wei{-}Hong Chuang and Min Wu}, title = {Semi non-intrusive training for cell-phone camera model linkage}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711468}, doi = {10.1109/WIFS.2010.5711468}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Chuang010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/DiasRG10, author = {Zanoni Dias and Anderson Rocha and Siome Goldenstein}, title = {First steps toward image phylogeny}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711452}, doi = {10.1109/WIFS.2010.5711452}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/DiasRG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FillerF10, author = {Tom{\'{a}}s Filler and Jessica J. Fridrich}, title = {Minimizing additive distortion functions with non-binary embedding operation in steganography}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711444}, doi = {10.1109/WIFS.2010.5711444}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/FillerF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FlorencioH10, author = {Dinei Flor{\^{e}}ncio and Cormac Herley}, title = {Phishing and money mules}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711465}, doi = {10.1109/WIFS.2010.5711465}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/FlorencioH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FrancoisSEF10, author = {J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Radu State and Thomas Engel and Olivier Festor}, title = {Digital forensics in VoIP networks}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711450}, doi = {10.1109/WIFS.2010.5711450}, timestamp = {Thu, 02 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/FrancoisSEF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FranzDHJ0S10, author = {Martin Franz and Bj{\"{o}}rn Deiseroth and Kay Hamacher and Somesh Jha and Stefan Katzenbeisser and Heike Schr{\"{o}}der}, title = {Secure computations on non-integer values}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711458}, doi = {10.1109/WIFS.2010.5711458}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/FranzDHJ0S10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/GaddeAR10, author = {Ravindra B. Gadde and Donald A. Adjeroh and Arun Ross}, title = {Indexing iris images using the Burrows-Wheeler Transform}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711467}, doi = {10.1109/WIFS.2010.5711467}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/GaddeAR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/GaubatzS10, author = {Matthew Gaubatz and Steven J. Simske}, title = {Towards a feature set for robust printing-imaging cycle device identification using structured printed markings}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711463}, doi = {10.1109/WIFS.2010.5711463}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/GaubatzS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/HsiehLL10, author = {Pei{-}Lun Hsieh and Yu{-}Ming Liang and Hong{-}Yuan Mark Liao}, title = {Recognition of blurred license plate images}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711447}, doi = {10.1109/WIFS.2010.5711447}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/HsiehLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/HuangM10, author = {Yen{-}Wei Huang and Pierre Moulin}, title = {Maximin optimality of the arcsine fingerprinting distribution and the interleaving attack for large coalitions}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711451}, doi = {10.1109/WIFS.2010.5711451}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/HuangM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/KarakoyunluS10, author = {Deniz Karakoyunlu and Berk Sunar}, title = {Differential template attacks on {PUF} enabled cryptographic devices}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711445}, doi = {10.1109/WIFS.2010.5711445}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/KarakoyunluS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/KarthikH10, author = {Kannan Karthik and Dimitrios Hatzinakos}, title = {{MIX-SPLIT:} Controlled mixing of secrets and traceable pseudonym generation using codebooks}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711443}, doi = {10.1109/WIFS.2010.5711443}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/KarthikH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/KeeF10, author = {Eric Kee and Hany Farid}, title = {Exposing digital forgeries from 3-D lighting environments}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711437}, doi = {10.1109/WIFS.2010.5711437}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/KeeF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/LiuLHC10, author = {Bei{-}Bei Liu and Heung{-}Kyu Lee and Yongjian Hu and Chang{-}Hee Choi}, title = {On classification of source cameras: {A} graph based approach}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711446}, doi = {10.1109/WIFS.2010.5711446}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/LiuLHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MairgiotisG10, author = {Antonis Mairgiotis and Nikolaos Galatsanos}, title = {Bayesian watermark detection and new perceptual mask based on a spatially weighted Total Variation image prior}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711464}, doi = {10.1109/WIFS.2010.5711464}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/MairgiotisG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MajzoobiKD10, author = {Mehrdad Majzoobi and Farinaz Koushanfar and Srinivas Devadas}, title = {{FPGA} {PUF} using programmable delay lines}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711471}, doi = {10.1109/WIFS.2010.5711471}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/MajzoobiKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MathonBCM10, author = {Benjamin Mathon and Patrick Bas and Fran{\c{c}}ois Cayre and Beno{\^{\i}}t Macq}, title = {Security and robustness constraints for spread-spectrum Tardos fingerprinting}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711457}, doi = {10.1109/WIFS.2010.5711457}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/MathonBCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Nandakumar10, author = {Karthik Nandakumar}, title = {A fingerprint cryptosystem based on minutiae phase spectrum}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711456}, doi = {10.1109/WIFS.2010.5711456}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Nandakumar10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/OdinakaLKOSKSR10, author = {Ikenna Odinaka and Po{-}Hsiang Lai and Alan David Kaplan and Joseph A. O'Sullivan and Erik J. Sirevaag and Sean D. Kristjansson and Amanda K. Sheffield and John W. Rohrbaugh}, title = {{ECG} biometrics: {A} robust short-time frequency analysis}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711466}, doi = {10.1109/WIFS.2010.5711466}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/OdinakaLKOSKSR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/PollardSA10, author = {Stephen B. Pollard and Steven J. Simske and Guy B. Adams}, title = {Model based print signature profile extraction for forensic analysis of individual text glyphs}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711442}, doi = {10.1109/WIFS.2010.5711442}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/PollardSA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Rane010, author = {Shantanu Rane and Wei Sun}, title = {Privacy preserving string comparisons based on Levenshtein distance}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711449}, doi = {10.1109/WIFS.2010.5711449}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Rane010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/SadasivamMM10, author = {Shankar Sadasivam and Pierre Moulin and Sean P. Meyn}, title = {A universal divergence-rate estimator for steganalysis in timing channels}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711459}, doi = {10.1109/WIFS.2010.5711459}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/SadasivamMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/SalmaniTP10, author = {Hassan Salmani and Mohammad Tehranipoor and Jim Plusquellic}, title = {A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711438}, doi = {10.1109/WIFS.2010.5711438}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/SalmaniTP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ScheirerBB10, author = {Walter J. Scheirer and William Bishop and Terrance E. Boult}, title = {Beyond {PKI:} The Biocryptographic Key Infrastructure}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711435}, doi = {10.1109/WIFS.2010.5711435}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ScheirerBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/TanLYS10, author = {Bozhao Tan and Aaron Lewicke and David Yambay and Stephanie Schuckers}, title = {The effect of environmental conditions and novel spoofing methods on fingerprint anti-spoofing algorithms}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711436}, doi = {10.1109/WIFS.2010.5711436}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/TanLYS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Veugen10, author = {Thijs Veugen}, title = {Encrypted integer division}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711448}, doi = {10.1109/WIFS.2010.5711448}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Veugen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/VoloshynovskiyK10, author = {Sviatoslav Voloshynovskiy and Oleksiy J. Koval and Taras Holotyak and Fokko Beekhof and Farzad Farhadzadeh}, title = {Privacy amplification of content identification systems based on fingerprint bit reliability}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711461}, doi = {10.1109/WIFS.2010.5711461}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/VoloshynovskiyK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/WillemsI10, author = {Frans M. J. Willems and Tanya Ignatenko}, title = {Identification and secret-key binding in binary-symmetric template-protected biometric systems}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711455}, doi = {10.1109/WIFS.2010.5711455}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/WillemsI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ZhaoS10, author = {Hong Zhao and Yun Q. Shi}, title = {A phase-space reconstruction approach to detect covert channels in {TCP/IP} protocols}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711441}, doi = {10.1109/WIFS.2010.5711441}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ZhaoS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/Zhou10, author = {Yuhan Zhou}, title = {Joint robust watermarking and image compression}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711440}, doi = {10.1109/WIFS.2010.5711440}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/Zhou10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wifs/2010, title = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5707112/proceeding}, isbn = {978-1-4244-9078-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.