IEEE International Carnahan Conference on Security Technology (ICCST), 2010 : 5 - 8 Oct. 2010, San Jose, California USA ; proceedings (English)
- New search for: Institute of Electrical and Electronics Engineers, Lexington Section
- Further information on Institute of Electrical and Electronics Engineers, Lexington Section:
- http://d-nb.info/gnd/5147698-8
- New search for: Pritchard, Daniel A.
- New search for: Institute of Electrical and Electronics Engineers, Lexington Section
- Further information on Institute of Electrical and Electronics Engineers, Lexington Section:
- http://d-nb.info/gnd/5147698-8
2010
-
ISBN:
- Conference Proceedings / Electronic Resource
-
Title:IEEE International Carnahan Conference on Security Technology (ICCST), 2010 : 5 - 8 Oct. 2010, San Jose, California USA ; proceedings
-
Contributors:
-
Conference:IEEE International Carnahan Conference on Security Technology ; 44 ; 2010 ; San Jose, Calif.
ICCST ; 44 ; 2010 ; San Jose, Calif. -
Publisher:
- New search for: IEEE
-
Place of publication:Piscataway, NJ
-
Publication date:2010
-
Size:Online-Ressource
-
Remarks:Parallel als Druckausg. erschienen
-
ISBN:
-
Type of media:Conference Proceedings
-
Type of material:Electronic Resource
-
Language:English
- New search for: 53.83
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 53.83 Überwachungstechnik, Leittechnik -
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
VIGICOP: Autonomous Surveillance Robots with Sodar Detection and Autonomous NavigationDuran, J. / Abril, E.J. / Rodriguez, F.J. / Garcia, J.F. / Matellan, V. / Villacorta, J.J. / Izquierdo, A. / Cerezal, S. / Calvo, M. et al. | 2010
- 1
-
Smart power grid security: A unified risk management approachDatta Ray, Partha / Harnoor, R. / Hentea, M. et al. | 2010
- 1
-
[Spine]| 2010
- 1
-
Network algorithms for information analysis using the Titan ToolkitMcLendon, W.C. / Shead, T.M. / Wilson, A. / Wylie, B. / Baumes, J. et al. | 2010
- 1
-
Program & timetable| 2010
- 1
-
Network access control (NAC): An open source analysis of architectures and requirementsSerrao, G.J. et al. | 2010
- 1
-
[Copyright notice]| 2010
- 7
-
Correctional Service Canada's "next generation" command and control systems architectureMorton, E. et al. | 2010
- 42
-
Side Channel Analysis Countermeasures using Obfuscated InstructionsKim, Yong C. / Trias, Eric D. / Slaman, Daniel R. et al. | 2010
- 142
-
Scatter enhanced 3D X-ray imaging for materials identificationChan, Jer / Evans, P. / Wang, Xun / Godber, S. / Peatfield, I. / Rogers, K. / Rogers, J. / Dicken, A. et al. | 2010
- 190
-
Discriminative Multi-Projection Vectors: Modifying the Discriminative Common Vectors approach for face verificationPozo-Banos, M. / Travieso, C.M. / Alonso, J.B. / Ferrer, M.A. et al. | 2010
- 198
-
Facial image processing for facial analysisYap, Moi-Hoon / Ugail, H. / Zwiggelaar, R. / Rajoub, B. et al. | 2010
- 221
-
Use of a hybrid technology in a critical security systemTrujillo, David / Scharmer, Carol et al. | 2010
- 259
-
An evaluation of the Human Biometric Sensor Interaction using hand geometryElliott, S.J. / Senjaya, B. / Kukula, E.P. / Werner, J.M. / Wade, M. et al. | 2010
- 323
-
Human versus biometric detection of texture similarity in left and right irisesBowyer, K W / Lagree, S / Fenker, S et al. | 2010
- c1
-
[Front cover]| 2010
- c4
-
[Back cover]| 2010
- i
-
[Title page]| 2010