Unreconciled Collicions Uncover Cloning Attacks in Anonymous RFFID Systems / Kai Bu, et al.
Increasing Security Degree of Freedom in Multiuser and Multieve Systems / Kun Xie, Wen Chen, Lili Wei
The Source Identification Game: an information-theoretic perspective / Mauro Barni, Benedetta Tondi
An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection / Remi Cogranne, Florent Retraint
A Timing Channel Spyware for the CSMA/CA Protocol / Negar Kiyavash, et al.
Gender Classification Based on Fusion of Different Spatial Scale Features Selected by Mutual InformationFrom Histogram of LBP, Intensity, and Shape / Juan E. Tapia, Claudio A. Perez
SVM Training Phase Reduction Using Database Feature Filtering for Malware Detection / Philip O'Kane, et al.
Cost-Sensitive Subspace Analysis and Extensions for Face Recognition / Jiwen Lu, Yap-Peng Tan
A New Method for EEG-Based Concealed Information Test / Deng Wang, Duoqian Miao, Gunnar Blohm
Snoop-Forge-Replay Attacks on Continuous Verification with Keystrokes / Khandaker A. Rahman, Kiran S. Balagani, Vir V. Phoha
etc.