Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems

  • Jerzy Pejaś
  • Andrzej Piegat

Table of contents

  1. Front Matter
    Pages i-xi
  2. Information Technology Security

    1. Front Matter
      Pages 1-1
    2. Tomasz Hebisz, Eugeniusz Kuriata
      Pages 13-22
    3. Igor Margasiński, Krzysztof Szczypiorski
      Pages 71-82
    4. Bartosz Sokół, V. N. Yarmolik
      Pages 83-92
    5. Marek Jackiewicz, Eugeniusz Kuriata
      Pages 93-102
    6. Janusz Górski, Aleksander Jarzębowicz, Rafał Leszczyna, Jakub Miler, Marcin Olszewski
      Pages 103-112
    7. Włodzimierz Chocianowicz, Jerzy Pejaś, Andrzej Ruciński
      Pages 113-124
    8. Krzysztof Chmiel
      Pages 125-134
    9. S. Berczyński, 2)YY. A. Kravtsov, J. Pejas, E. D. Surovyatkina
      Pages 135-142
  3. Biometric Systems

  4. Methods of Artificial Intelligence and Intelligent Agents

    1. Front Matter
      Pages 253-253
    2. Gisella Facchinetti, Ilda Mannino, Giovanni Mastroleo, Stefano Soriani
      Pages 255-265
    3. Zbigniew Pietrzykowski
      Pages 285-299
    4. Roman Śmierzchalski
      Pages 311-319
    5. Anna Bartkowiak, Joanna Zdziarek, Niki Evelpidou, Andreas Vassilopoulos
      Pages 337-344
    6. Koichi Kashiwagi, Yoshinobu Higami, Shin-Ya Kobayashi
      Pages 387-394
  5. Back Matter
    Pages 395-396

About these proceedings


Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others.

"Information Technology Security" covers three important areas of security engineering in information systems: software security, public key infrastructure and the design of new cryptographic protocols and algorithms.

"Biometric Systems" comprises 11 contributions dealing with face picture analysis and recognition systems. This chapter focuses on known methods of biometric problem solution as well as the design of new models.


Extension Neural Gas artificial intelligence artificial intelligence system biometrics classification cognition data mining dynamical systems image processing information system modeling neural network simulation verification

Editors and affiliations

  • Jerzy Pejaś
    • 1
  • Andrzej Piegat
    • 1
  1. 1.Technical University of SzczecinPoland

Bibliographic information

  • DOI
  • Copyright Information Springer Science+Business Media, Inc. 2005
  • Publisher Name Springer, Boston, MA
  • eBook Packages Computer Science
  • Print ISBN 978-1-4020-7776-0
  • Online ISBN 978-0-387-23484-7
  • Buy this book on publisher's site