Default Cover Image

2014 Fifth International Conference on Emerging Security Technologies (EST)

Sept. 10 2014 to Sept. 12 2014

Alcala de Henares, Spain

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-vii
PrefaceFreely available from IEEE.pp. viii-ix
Conference OrganizationFreely available from IEEE.pp. x-x
Program CommitteeFreely available from IEEE.pp. xi-xi
ReviewersFreely available from IEEE.pp. xii-xii
KeynotesFreely available from IEEE.pp. xiii-xvi
Locating Missing Persons Using Age-Progression Images from Forensic ArtistsFull-text access may be available. Sign in or learn about subscription options.pp. 1-1
Modeling Risks in Biometric-Based Authentication Control SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 2-7
Towards 'Receipt-Freeness' in Remote Biometric AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 8-12
Content Reconstruction Using Keystroke Dynamics: Preliminary ResultsFull-text access may be available. Sign in or learn about subscription options.pp. 13-18
Comparison of Ear Recognition Robustness of Single-View-Based Images Rotated in DepthFull-text access may be available. Sign in or learn about subscription options.pp. 19-23
Multispectral Hand BiometricsFull-text access may be available. Sign in or learn about subscription options.pp. 24-29
Influence of Holding Smart Phone for Acceleration-Based Gait AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 30-33
Gait Identification Using Invisible Shadows: Robustness to Appearance ChangesFull-text access may be available. Sign in or learn about subscription options.pp. 34-39
FIBAR: Fingerprint Imaging by Binary Angular Reflection for Individual Identification of Metal PartsFull-text access may be available. Sign in or learn about subscription options.pp. 46-51
Powered Wheelchair Platform for Assistive Technology DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 52-56
Ideograms Representation for Cognitive Systems in RoboticsFull-text access may be available. Sign in or learn about subscription options.pp. 57-62
Zero Moment Point/Inverted Pendulum-Based Walking Algorithm for the NAO RobotFull-text access may be available. Sign in or learn about subscription options.pp. 63-66
Non-overlapping Dual Camera Fall Detection Using the Nao Humanoid RobotFull-text access may be available. Sign in or learn about subscription options.pp. 67-70
Obscured Asymmetric Crypto-Functions for Secured IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 71-76
On the Incorporation of Secure Filter in ICMetrics Group CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 77-81
On Secure Group Admission Control Using ICMetricsFull-text access may be available. Sign in or learn about subscription options.pp. 82-87
An Assessment of Recent Attacks on Specific Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 88-93
Protecting and Identifiying Smartphone Apps Using IcmetricsFull-text access may be available. Sign in or learn about subscription options.pp. 94-98
Side-Channel Attack against the Capy HIPFull-text access may be available. Sign in or learn about subscription options.pp. 99-104
A Two-Factor Authentication System with QR Codes for Web and Mobile ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 105-112
Fourth-Person Sensing for Pro-active ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 113-117
Encouraging the Application of Virtual Environments for Space TrainingFull-text access may be available. Sign in or learn about subscription options.pp. 118-123
Detecting Objects for Indoor Monitoring and Surveillance for Mobile RobotsFull-text access may be available. Sign in or learn about subscription options.pp. 124-129
Author IndexFreely available from IEEE.pp. 130-130
Publisher's InformationFreely available from IEEE.pp. 132-132
Showing 35 out of 35