Scanning of electromagnetic radiation for EMC and data security purposes (English)
- New search for: Kresalek, V.
- New search for: Smola, M.
- New search for: Kosina, T.
- New search for: Kresalek, V.
- New search for: Smola, M.
- New search for: Kosina, T.
In:
IEEE International Carnahan Conference on Security Technology, 42
;
117-120
;
2008
-
ISBN:
- Conference paper / Print
-
Title:Scanning of electromagnetic radiation for EMC and data security purposes
-
Contributors:
-
Published in:
-
Publisher:
- New search for: IEEE Operations Center
-
Place of publication:Piscataway
-
Publication date:2008
-
Size:4 Seiten, 5 Quellen
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Development trends of electronic authenticationSmejkal, Vladimir / Kodl, Jindrich et al. | 2008
- 7
-
Measures against police information leakage utilizing automatic encryption and access control softwareYanagihara Tadaaki, et al. | 2008
- 13
-
New trends in security of electronic health documentationBrechlerova, Dagmar / Candik, Marek et al. | 2008
- 17
-
A study of global numbering plan with active anti-spit capability on VoIPHsia-Ling Chiang, / Yeh Shu-Ming, / Hong Ming-Hong, / Lin, John et al. | 2008
- 23
-
A novel approach to the security of data hidden in multimedia objectsZolotavkin, Yevhen / Lukichov, Vitaliy / Vasyura, Anatoliy et al. | 2008
- 29
-
Secure quantum packet transmission mechanism for wireless networksTien-Sheng Lin, / Sy-Yen Kuo, et al. | 2008
- 37
-
An efficient digital image watermarking schemeEl-Iskandarani, M. A. / Saad, Saad M. / Abubahia, Ahmed. M. et al. | 2008
- 43
-
Digital watermarking in digital imagesCandik, Marek / Brechlerova, Dagmar et al. | 2008
- 47
-
Improving the implementation of access control in EMRFerreira, Ana / Cruz-Correia, Ricardo / Chadwick, David / Antunes, Luis et al. | 2008
- 51
-
A robust and secure scheme for image transmission over wireless channelsEl-Iskandarani, M. A. / Darwish, Saad / Abuguba, Saad M. et al. | 2008
- 56
-
Efficient speaker verification system using speaker model clustering for T and Z normalizationsRavulakollu, Kiran / Apsingekar, Vijendra Raj / De Leon, Phillip L. et al. | 2008
- 63
-
Based security model for home systemVolner, Rudolf / Bores, Petr et al. | 2008
- 69
-
Improvement of pattern hiding method of data application in JPEG-filesLukitchov, Vitaliy / Vasyura, Anatoliy / Zolotavkin, Yevhen et al. | 2008
- 76
-
Security recommendations for implementation in distributed healthcare systemsLhotska, Lenka / Aubrecht, Petr / Valls, Aida / Gibert, Karina et al. | 2008
- 84
-
Information protection from network sniffing of bandwidths sharingChang-Lung Tsai, / Tsung-Hsian Wu, et al. | 2008
- 89
-
Countering ambiguity in exterior intrusion detectionPeck, Lindamae et al. | 2008
- 94
-
Acoustic tamper detection sensor with very low false alarm rateMuijlwijk, Lawrence / Scott, Jonathan et al. | 2008
- 98
-
Standardised procedures for evaluating PIDSFeraday, Simon / Tarr, Stephen et al. | 2008
- 102
-
Trial results of a new low-cost and covert technology to trace the path of maritime containers worldwideSchmidt, Rene / Gagnon, Andre / Allcock, Dave et al. | 2008
- 107
-
Image quality assessment software of security screening systemWu, Wei / Liu, Gang / Zhou, Zhenggan / Gu, Zhu et al. | 2008
- 112
-
Dark current elimination in security imaging systemsSvihlik, Jan et al. | 2008
- 117
-
Scanning of electromagnetic radiation for EMC and data security purposesKresalek, Vojtech / Smola, Michal / Kosina, Tomas et al. | 2008
- 121
-
Modeling of the widefield space variant security systemsRerabek, Martin / Pata, Petr et al. | 2008
- 126
-
The advanced noise model for an IDN based restoration of black and white pictures captured by a camera with CCD/CMOS sensorKekrt, Daniel / Klima, Milos et al. | 2008
- 131
-
User experiences with an unobtrusive decision aid for deception detectionJensen, Matthew L. / Burgoon, Judee K. / Nunamaker, Jay F. et al. | 2008
- 135
-
Securing a Health Information System with a government issued digital identification cardSantos, Ricardo / Correia, Manuel E. / Antunes, Luis et al. | 2008
- 142
-
Aspects of image quality enhancement in security technologyKlima, Milos / Kekrt, Daniel / Podgorny, Radek et al. | 2008
- 150
-
Potential noncontact tools for rapid credibility assessment from physiological and behavioral cuesBurgoon, Judee K. / Derrick, Douglas C. / Elkins, Aaron C. / LaMarc Humphreys, Sean / Jensen, Matthew L. / Diller, Christopher B.R. / Nunamaker, Jay F. et al. | 2008
- 158
-
Investigating the relationship between fingerprint image quality and skin characteristicsBlomeke, Christine R. / Modi, Shimon K. / Elliott, Stephen J. et al. | 2008
- 162
-
’Hidden signature’ —- a new solution for on-line verification using DTWPutz-Leszczynska, Joanna / Pacut, Andrzej et al. | 2008
- 167
-
Writer identification based on graphology techniquesSantana, Omar / Travieso, Carlos M. / Alonso, Jesus B. / Ferrer, Miguel A. et al. | 2008
- 174
-
Characterizing biometric behavior through haptics and Virtual RealityIglesias, Rosa / Orozco, Mauricio / Alsulaiman, Fawaz A. / Valdes, Julio J. / El Saddik, Addulmotaleb et al. | 2008
- 180
-
Biometric systems simulations performing close to real world conditionsFabrega, Joan / Faundez-Zanuy, Marcos et al. | 2008
- 187
-
Face recognition approach based on wavelet transformEspinosa-Duro, Virginia / Monte-Moreno, Enric et al. | 2008
- 191
-
Comparing infrared and visible illumination for contactless hand based biometric schemeMorales, Anythami / Ferrer, Miguel A. / Alonso, Jesus B. / Travieso, Carlos M. et al. | 2008
- 198
-
Image compact formats of iris samples for interoperability in biometric systemsSanchez-Reillo, Raul / Liu-Jimenez, Judith / Lorenz, Michael G. / Mengibar-Pozo, Luis et al. | 2008
- 206
-
A new algorithm for signature verification system based on DTW and GMMMiguel-Hurtado, Oscar / Mengibar-Pozo, Luis / Pacut, Andrzej et al. | 2008
- 214
-
Particle filtering in multilevel color context for face detection and tracking in real-time video sequencesStasiak, Lukasz / Pacut, Andrzej et al. | 2008
- 221
-
Influence of the pegs number and distribution on a biometric device based on hand geometryFerrer, Miguel A. / Morales, Aythami / Travieso, Carlos M. / Alonso, Jesus B. et al. | 2008
- 226
-
A fuzzy DNA-based algorithm for identification and authentication in an Iris Detection Systemde Santos Sierra, Alberto / Avila, Carmen Sanchez / Vera, Vicente Jara et al. | 2008
- 233
-
Evaluation methodology for fake samples detection in biometricsFernandez-Saavedra, Belen / Sanchez-Reillo, Raul / Alonso-Moreno, Raul / Sanchez-Avila, Carmen et al. | 2008
- 241
-
User-friendly biometric camera for speeding iris recognition systemsLorenz, Michael G. / Mengibar-Pozo, Luis / Liu-Jimenez, Judith / Fernandez-Saavedra, Belen et al. | 2008
- 247
-
Replay attack prevention for iris biometricsCzajka, Adam / Pacut, Andrzej et al. | 2008
- 254
-
On the enhancement of speaker identification accuracy using weighted bilateral scoringMalegaonkar, A. / Ariyaeeinia, A. / Sivakumaran, P. / Fortuna, J. et al. | 2008
- 259
-
A novel scheme for face recognition and authentication with illumination and expression changesYing-Nong Chen, / Chin-Chuan Han, / Cheng-Tzu Wang, / Kuo-Chin Fan, et al. | 2008
- 265
-
Skills in detecting gun carrying from CCTVBlechko, Anastassia / Darker, Iain / Gale, Alastair et al. | 2008
- 272
-
Embedded traffic analysis system based on Fourier descriptor and motion homogeneity measurementChang-Lung Tsai, / Wei-Lieh Hsu, / Chin-Chuan Han, et al. | 2008
- 277
-
Evaluating multiple camera tracking systems - the i-LIDS 5TH scenarioNilski, Adam et al. | 2008
- 280
-
Blind methods for detecting image fakeryMahdian, Babak / Saic, Stanislav et al. | 2008
- 287
-
High threat entry control points design: A holistic approachCavileer, Doug et al. | 2008
- 292
-
Security and crisis management for air transportVolner, Rudolf / Smrz, Vladimir et al. | 2008
- 299
-
Relationship between level of detection performance and amount of recurrent computer-based trainingMichel, Stefan / Koller, Saskia M. / Schwaninger, Adrian et al. | 2008
- 305
-
Opportunities for increased use of standards in the integration of Perimeter Intrusion Detection SystemsDewar, Stewart et al. | 2008
- 312
-
Secure communications through speech dedicated channels using digital modulationsChmayssani, Toufic / Baudoin, Genevieve / Hendryckx, Gael et al. | 2008
- 318
-
Autonomous access control systemTeply, Tomas / Foit, Julius et al. | 2008
- 321
-
Farm: An automated malware analysis environmentVan Randwyk, Jamie / Chiang, Ken / Lloyd, Levi / Vanderveen, Keith et al. | 2008
- 326
-
E-banking security - comparative studyHanaek, Petr / Malinka, Kamil / Schafer, Jiri et al. | 2008
- 331
-
A practical approach for building a parallel firewall for ten gigabit Ethernet backboneKoht-arsa, Kasom / Sanguanpong, Surasak et al. | 2008
- 339
-
Malware spreading models in peer-to-peer networksSchafer, Jiri / Malinka, Kamil / Hanacek, Petr et al. | 2008
- 346
-
Security and reliability considerations for distributed healthcare systemsMatousek, Kamil et al. | 2008
- 349
-
TacNet Tracker©: Built-in capabilities for situational awarenessRiblett, Loren E. / Wiseman, James M. et al. | 2008
- 357
-
Covert testing at airports: Exploring methodology and resultsWetter, Olive Emil / Hardmeier, Diana / Hofer, Franziska et al. | 2008
- 364
-
Real-time video surveillance for first responders in an emergency situationGreen, Mary W. / Sparks, Richard / Pritchard, Daniel A. et al. | 2008
- 371
-
Eyetracking based approach to objective image quality assessmentFliegel, Karel et al. | 2008
- 377
-
Physilogical data transmission network using ZigBeeVitek, Tomas / Hnyk, Ondrej et al. | 2008
- 381
-
KLT coder for compression of security imagesPata, Petr et al. | 2008
- 387
-
Detection, tracking and classification of moving objects for unstable video surveillance applicationsKutzer, Michael / Vigaru, Bogdan et al. | 2008
- c1
-
Cover| 2008
- ii
-
Copyright| 2008
- iii
-
Welcome address| 2008
- iv
-
Executive committee emeritus| 2008
- v
-
Committees| 2008
- vi
-
History note| 2008
- vii
-
Contents| 2008
- xii
-
Author index| 2008