![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 85 matches
- 2009
- Parag Agarwal, Balakrishnan Prabhakaran:
Robust blind watermarking of point-sampled geometry. IEEE Trans. Inf. Forensics Secur. 4(1): 36-48 (2009) - Tigran Antonyan, Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas C. Nicolaou, Alexander Russell
, Alexander A. Shvartsman
:
State-wide elections, optical scan voting systems, and the pursuit of integrity. IEEE Trans. Inf. Forensics Secur. 4(4): 597-610 (2009) - Savvas Argyropoulos, Dimitrios Tzovaras
, Dimosthenis Ioannidis
, Michael G. Strintzis:
A channel coding approach for human authentication from gait sequences. IEEE Trans. Inf. Forensics Secur. 4(3): 428-440 (2009) - Craig Belcher, Yingzi Du:
Corrections to "A selective feature information approach for iris image-quality measure". IEEE Trans. Inf. Forensics Secur. 4(3): 578 (2009) - Josh Benaloh, Tal Moran, Lee Naish, Kim Ramchen, Vanessa Teague:
Shuffle-sum: coercion-resistant verifiable tallying for STV voting. IEEE Trans. Inf. Forensics Secur. 4(4): 685-698 (2009) - Tiziano Bianchi
, Alessandro Piva
, Mauro Barni:
On the implementation of the discrete Fourier transform in the encrypted domain. IEEE Trans. Inf. Forensics Secur. 4(1): 86-97 (2009) - Giulia Boato, Valentina Conotter, Francesco G. B. De Natale, Claudio Fontanari:
Watermarking robustness evaluation based on perceptual quality via genetic algorithms. IEEE Trans. Inf. Forensics Secur. 4(2): 207-216 (2009) - Jens-Matthias Bohli, Christian Henrich, Carmen Kempka, Jörn Müller-Quade, Stefan Röhrich:
Enhancing electronic voting machines on the example of Bingo voting. IEEE Trans. Inf. Forensics Secur. 4(4): 745-750 (2009) - Bryan A. Campbell, Michael D. Byrne:
Straight-party voting: what do voters think? IEEE Trans. Inf. Forensics Secur. 4(4): 718-728 (2009) - Giacomo Cancelli, Mauro Barni:
MPSteg-color: data hiding through redundant basis decomposition. IEEE Trans. Inf. Forensics Secur. 4(3): 346-358 (2009) - Hong Cao, Alex C. Kot:
Accurate detection of demosaicing regularity for digital image forensics. IEEE Trans. Inf. Forensics Secur. 4(4): 899-910 (2009) - Byung-Ho Cha, C.-C. Jay Kuo
:
Robust MC-CDMA-based fingerprinting against time-varying collusion attacks. IEEE Trans. Inf. Forensics Secur. 4(3): 302-317 (2009) - Chin-Chen Chang, Chia-Chen Lin
, T. Hoang Ngan Le
, Hoai Bac Le:
Self-verifying visual secret sharing using error diffusion and interpolation techniques. IEEE Trans. Inf. Forensics Secur. 4(4): 790-801 (2009) - Hong Chang, Yi Yao, Andreas F. Koschan, Besma R. Abidi, Mongi A. Abidi:
Improving face recognition via narrowband spectral range selection using Jeffrey divergence. IEEE Trans. Inf. Forensics Secur. 4(1): 111-122 (2009) - David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan
, Emily Shen, Alan T. Sherman, Poorvi L. Vora:
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Trans. Inf. Forensics Secur. 4(4): 611-627 (2009) - Zesheng Chen, Chuanyi Ji:
An information-theoretic view of network-aware malware attacks. IEEE Trans. Inf. Forensics Secur. 4(3): 530-541 (2009) - Lin Chen, Jean Leneutre:
A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans. Inf. Forensics Secur. 4(2): 165-178 (2009) - Maha El Choubassi, Pierre Moulin:
On reliability and security of randomized detectors against sensitivity analysis attacks. IEEE Trans. Inf. Forensics Secur. 4(3): 273-283 (2009) - Ritendra Datta, Jia Li, James Ze Wang
:
Exploiting the human-machine gap in image recognition for designing CAPTCHAs. IEEE Trans. Inf. Forensics Secur. 4(3): 504-518 (2009) - Gabriel Domínguez-Conde, Pedro Comesaña
, Fernando Pérez-González
:
Performance analysis of Fridrich-Goljan self-embedding authentication method. IEEE Trans. Inf. Forensics Secur. 4(3): 570-577 (2009) - Chun-I Fan, Yi-Hui Lin:
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Trans. Inf. Forensics Secur. 4(4): 933-945 (2009) - Hany Farid:
Exposing digital forgeries from JPEG ghosts. IEEE Trans. Inf. Forensics Secur. 4(1): 154-160 (2009) - Chuhong Fei, Raymond H. Kwong, Deepa Kundur:
A hypothesis testing approach to semifragile watermark-based authentication. IEEE Trans. Inf. Forensics Secur. 4(2): 179-192 (2009) - Marcello Ferro
, Giovanni Pioggia
, Alessandro Tognetti
, Nicola Carbonaro
, Danilo De Rossi:
A sensing seat for human authentication. IEEE Trans. Inf. Forensics Secur. 4(3): 451-459 (2009) - Russell A. Fink, Alan T. Sherman, Richard Carback:
TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules. IEEE Trans. Inf. Forensics Secur. 4(4): 628-637 (2009) - Jessica J. Fridrich:
Asymptotic behavior of the ZZW embedding construction. IEEE Trans. Inf. Forensics Secur. 4(1): 151-154 (2009) - Bo Fu, Simon X. Yang
, Jianping Li, Dekun Hu:
Multibiometric cryptosystem: model structure and performance analysis. IEEE Trans. Inf. Forensics Secur. 4(4): 867-882 (2009) - Ryan W. Gardner, Sujata Garera, Aviel D. Rubin:
Detecting code alteration by creating a temporary memory bottleneck. IEEE Trans. Inf. Forensics Secur. 4(4): 638-650 (2009) - Carsten Gottschlich
, Preda Mihailescu, Axel Munk:
Robust orientation field estimation and extrapolation using semilocal line sensors. IEEE Trans. Inf. Forensics Secur. 4(4): 802-811 (2009) - Hongmei Gou, Ashwin Swaminathan, Min Wu
:
Intrinsic sensor noise features for forensic analysis on scanners and scanned images. IEEE Trans. Inf. Forensics Secur. 4(3): 476-491 (2009)
skipping 55 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-22 09:24 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint