You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto-biometrics, including review, cancelable biometrics, cryptographic key generation from biometrics, and crypto-biometric key sharing protocols. Because of the thorough treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy. Table of Contents: Introduction / Cancelable Biometric System / Cryptographic Key Regeneration Using Biometrics / Biometrics-Based Secure Authentication Protocols / Concluding Remarks
Refereed postproceedings of the International Conference on Non-Linear Speech Processing, NOLISP 2005. The 30 revised full papers presented together with one keynote speech and 2 invited talks were carefully reviewed and selected from numerous submissions for inclusion in the book. The papers are organized in topical sections on speaker recognition, speech analysis, voice pathologies, speech recognition, speech enhancement, and applications.
This book presents the revised tutorial lectures given at the International Summer School on Nonlinear Speech Processing-Algorithms and Analysis held in Vietri sul Mare, Salerno, Italy in September 2004. The 14 revised tutorial lectures by leading international researchers are organized in topical sections on dealing with nonlinearities in speech signals, acoustic-to-articulatory modeling of speech phenomena, data driven and speech processing algorithms, and algorithms and models based on speech perception mechanisms. Besides the tutorial lectures, 15 revised reviewed papers are included presenting original research results on task oriented speech applications.
Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical perspective, it is the process of reconstructing the relevant sequence of events that have led to the currently observable state of a target IT system or (digital) artifacts. Over the last three decades, the importance of digital evidence has grown in lockstep with the fast societal adoption of information technology, which has resulted in the continuous accumulation of data at an exponential rate. Simultaneously, there has been a rapid growth in network connectivity and the complex...
We are very pleased to introduce Open Source Development, Communities and Quality. The International Conference on Open Source Systems has come to its fourth edition – OSS 2008. Now, Free, Libre, and Open Source software is by all means now one of the most relevant subjects of study in several disciplines, ranging from information technology to social sciences and including also law, business, and political sciences. There are several conference tracks devoted to open source software with several publications appearing in high quality journals and magazines. OSS 2008 has been organized with the purpose of being the reference venue for those working in this area, being the most prominent conference in this area. For this th reason OSS 2008 has been located within the frameworks of the 20 World Computer Congress, WCC 2008, in Milan, the largest event of IFIP in 2008. We believe that this conference series, and the IFIP working group it represents, can play an important role in meeting these challenges, and hope that this book will become a valuable contribution to the open source body of research.
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners.
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To en...
The two volume sets LNCS 8033 and 8034 constitutes the refereed proceedings of the 9th International Symposium on Visual Computing, ISVC 2013, held in Rethymnon, Crete, Greece, in July 2013. The 63 revised full papers and 35 poster papers presented together with 32 special track papers were carefully reviewed and selected from more than 220 submissions. The papers are organized in topical sections: Part I (LNCS 8033) comprises computational bioimaging; computer graphics; motion, tracking and recognition; segmentation; visualization; 3D mapping, modeling and surface reconstruction; feature extraction, matching and recognition; sparse methods for computer vision, graphics and medical imaging; and face processing and recognition. Part II (LNCS 8034) comprises topics such as visualization; visual computing with multimodal data streams; visual computing in digital cultural heritage; intelligent environments: algorithms and applications; applications and virtual reality.
The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains, is receiving increasing interest from various different communities. These communities are very diverse and amongst others include: technical enthusiasts, activist groups, researchers from various disciplines, start ups, large enterprises, public authorities, banks, financial regulators, business men, investors, and also criminals. The scientific community adapted relatively slowly to this emerging and fast-moving field of cryptographic currencies and consensus ledgers. This was one reason that, for quite a while, the only resources available have been the Bitcoin source code, blog and forum...
This book constitutes the refereed proceedings of the 11th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2009, held in Bordeaux, France in September/October 2009. The 43 revised full papers and 25 posters presented were carefully reviewed and selected from 115 submissions. The papers are organized in topical sections on technovision, fundamental mathematical techniques, image processing, coding and filtering, image and video analysis, computer vision, tracking, color, multispectral and special-purpose imaging, medical imaging, and biometrics.