Browse by Journal
Number of items: 10.
A
Asghar, Hassan Jameel, Steinfeld, Ron, Li, Shujun, Kaafa, Mohamed Ali, Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:69555) |
E
Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Alcaide, Almudena, Ribagorda, Arturo (2008) On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security, 3 (2). pp. 166-172. ISSN 1556-6013. (doi:10.1109/TIFS.2008.920724) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31957) |
H
Hurley-Smith, Darren, Hernandez-Castro, Julio (2018) Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG. IEEE Transactions on Information Forensics and Security, 13 (4). pp. 1031-1041. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2017.2777342) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67241) |
Hurley-Smith, Darren, Patsakis, Constantinos, Hernandez-Castro, Julio C. (2020) On the unbearable lightness of FIPS 140-2 randomness tests. IEEE Transactions on Information Forensics and Security, . p. 1. ISSN 1556-6013. (doi:10.1109/TIFS.2020.2988505) (KAR id:81881) |
Hu, Yang, Sirlantzis, Konstantinos, Howells, Gareth (2016) Optimal Generation of Iris Codes for Iris Recognition. IEEE Transactions on Information Forensics and Security, 12 (15). pp. 157-171. ISSN 1556-6013. (doi:10.1109/TIFS.2016.2606083) (KAR id:58277) |
Hu, Yang, Sirlantzis, Konstantinos, Howells, Gareth (2016) Signal-Level Information Fusion for Less Constrained Iris Recognition using Sparse-Error Low Rank Matrix Factorization. IEEE Transactions on Information Forensics and Security, 11 (7). pp. 1549-1564. ISSN 1556-6013. (doi:10.1109/TIFS.2016.2541612) (KAR id:53324) |
O
Osadchy, Margarita, Hernandez-Castro, Julio C., Gibson, Stuart J., Dunkelman, Orr, Perez-Cabo, Daniel (2017) No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, with Applications to CAPTCHA Generation. IEEE Transactions on Information Forensics and Security, 12 (11). pp. 2640-2653. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2017.2718479) (KAR id:62081) |
S
Sheng, Weiguo, Howells, Gareth, Fairhurst, Michael, Deravi, Farzin (2008) Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering. IEEE Transactions on Information Forensics and Security, 3 (2). pp. 183-191. ISSN 1556-6013. (doi:10.1109/TIFS.2008.922056) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:15843) |
Sheng, Weiguo, Howells, Gareth, Fairhurst, Michael, Deravi, Farzin (2007) A memetic fingerprint matching algorithm. IEEE Transactions on Information Forensics and Security, 2 (3). pp. 402-412. ISSN 1556-6013. (doi:10.1109/TIFS.2007.902681) (KAR id:2068) |
Z
Zhai, Xiaojun, Appiah, Kofi, Ehsan, Shoaib, Howells, Gareth, Hu, Huosheng, Gu, Dongbing, McDonald-Maier, Klaus D. (2015) A Method for Detecting Abnormal Program Behavior on Embedded Devices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1692-1704. ISSN 1556-6013. (doi:10.1109/TIFS.2015.2422674) (KAR id:50338) |