2005

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems

Editors:

ISBN: 978-1-4020-7776-0 (Print) 978-0-387-23484-7 (Online)

Table of contents (38 chapters)

previous Page of 2
  1. Information Technology Security

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-12

      How can we justify trust in software based systems?

    3. No Access

      Book Chapter

      Pages 13-22

      The capacity of ciphers fulfilling the accessibility of cryptograms

    4. No Access

      Book Chapter

      Pages 23-33

      Parallelization of the Data Encryption Standard (DES) algorithm

    5. No Access

      Book Chapter

      Pages 35-46

      Linked authenticated dictionaries for certificate status verification

    6. No Access

      Book Chapter

      Pages 47-59

      Integrated Payment System for Public Key Infrastructure Services

    7. No Access

      Book Chapter

      Pages 61-70

      Some methods of the analysis and risk assessment in the PKI system services providers

    8. No Access

      Book Chapter

      Pages 71-82

      VAST: Versatile Anonymous System for Web Users

    9. No Access

      Book Chapter

      Pages 83-92

      Cryptography and Steganography: teaching experience

    10. No Access

      Book Chapter

      Pages 93-102

      Analysis of non-linear pseudo-noise sequences

    11. No Access

      Book Chapter

      Pages 103-112

      Tool support for detecting defects in object-oriented models

    12. No Access

      Book Chapter

      Pages 113-124

      The Proposal of Protocol for Electronic Signature Creation in Public Environment

    13. No Access

      Book Chapter

      Pages 125-134

      On Arithmetic Subtraction Linear Approximation

    14. No Access

      Book Chapter

      Pages 135-142

      Secure Data Transmission via Modulation of the Chaotic Sequence Parameters

  2. Biometric Systems

    1. Front Matter

      Pages 143-143

    2. No Access

      Book Chapter

      Pages 145-156

      Some Advances and Challenges in Live Biometrics, Personnel Management, and Other “Human Being” Applications

    3. No Access

      Book Chapter

      Pages 157-164

      An environment for recognition systems modeling

    4. No Access

      Book Chapter

      Pages 165-176

      Modified Gradient Method for Face Localization

    5. No Access

      Book Chapter

      Pages 177-184

      Three stage face recognition algorithm for visitor identification system

    6. No Access

      Book Chapter

      Pages 185-194

      A New Approach for Hand-Palm Recognition

    7. No Access

      Book Chapter

      Pages 195-202

      An Experimental Criterion for Face Classification

    8. No Access

      Book Chapter

      Pages 203-208

      Contour Objects Recognition Based On UNL-Fourier Descriptors

previous Page of 2