ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
Latest Publications
TOTAL DOCUMENTS
67
(FIVE YEARS 0)
H-INDEX
7
(FIVE YEARS 0)
Published By IEEE
9781479964444, 9781479964437
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Proposed scheme for palm vein recognition based on Linear Discrimination Analysis and nearest neighbour classifier
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
◽
10.1109/isbast.2014.7013096
◽
2014
◽
Cited By ~ 5
Author(s):
Selma Elnasir
◽
Siti Mariyam Shamsuddin
Keyword(s):
Nearest Neighbour
◽
Discrimination Analysis
◽
Linear Discrimination
◽
Linear Discrimination Analysis
◽
Vein Recognition
◽
Nearest Neighbour Classifier
◽
Palm Vein
Download Full-text
Comparison of effective hough transform-based fingerprint alignment approaches
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
◽
10.1109/isbast.2014.7013099
◽
2014
◽
Cited By ~ 1
Author(s):
Cynthia S. Mlambo
◽
Fulufhelo V. Nelwamondo
◽
Mmamolatelo E. Mathekga
Keyword(s):
Hough Transform
◽
Fingerprint Alignment
Download Full-text
SECRET: A secure and efficient certificate revocation scheme for Mobile Ad hoc Networks
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
◽
10.1109/isbast.2014.7013110
◽
2014
◽
Cited By ~ 1
Author(s):
Dieynaba Mall
◽
Karim Konate
◽
Al-Sakib Khan Pathan
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Certificate Revocation
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A review of recent advances on multimedia watermarking security and design implications for digital Quran computing
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
◽
10.1109/isbast.2014.7013139
◽
2014
◽
Cited By ~ 3
Author(s):
Omar Tayan
◽
Yasser M. Alginahi
Keyword(s):
Recent Advances
◽
Multimedia Watermarking
Download Full-text
DNA approach for password conversion generator
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
◽
10.1109/isbast.2014.7013114
◽
2014
◽
Author(s):
Chng Chern Wei
Download Full-text
Title page
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
◽
10.1109/isbast.2014.7013078
◽
2014
◽
Keyword(s):
Title Page
Download Full-text
A taxonomy on intrusion alert aggregation techniques
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
◽
10.1109/isbast.2014.7013129
◽
2014
◽
Cited By ~ 1
Author(s):
Taqwa Ahmed
◽
Maheyzah Md Siraj
◽
Anazida Zainal
◽
Mazura Mat Din
Keyword(s):
Aggregation Techniques
Download Full-text
A review of cloud security based on cryptographic mechanisms
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
◽
10.1109/isbast.2014.7013103
◽
2014
◽
Cited By ~ 2
Author(s):
Sura Khalil Abd
◽
S.A.R Al-Haddad
◽
Fazirulhisyam Hashim
◽
Azizol Abdullah
Keyword(s):
Cloud Security
Download Full-text
Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
◽
10.1109/isbast.2014.7013108
◽
2014
◽
Cited By ~ 5
Author(s):
Natasha Arjumand Shoaib Mirza
◽
Haider Abbas
◽
Farrukh Aslam Khan
◽
Jalal Al Muhtadi
Keyword(s):
Advanced Persistent Threat
Download Full-text
JPEG mage encryption with Elliptic Curve Cryptography
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
◽
10.1109/isbast.2014.7013111
◽
2014
◽
Cited By ~ 4
Author(s):
Saeid Bakhtiari
◽
Subariah Ibrahim
◽
Mazleena Salleh
◽
Majid Bakhtiari
Keyword(s):
Elliptic Curve
◽
Elliptic Curve Cryptography
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close