-
1
-
-
33746279684
-
Intel(R) wireless trusted platform: Security for mobile devices
-
Intel Corp
-
Intel Corp., Santa Clara, CA, "Intel(R) wireless trusted platform: Security for mobile devices," 2004.
-
(2004)
-
-
-
2
-
-
34047119317
-
-
Texas Instruments, Inc, Dallas, TX
-
S. Hattangady and C. Davis, "Reducing the security threats to 2.5G and 3G wireless applications," Texas Instruments, Inc., Dallas, TX, 2002.
-
(2002)
Reducing the security threats to 2.5G and 3G wireless applications
-
-
Hattangady, S.1
Davis, C.2
-
4
-
-
4444331720
-
Security as a new dimension in embedded system design
-
P. Kocher, R. B. Lee, G. McGraw, A. Raghunathan, and S. Ravi, "Security as a new dimension in embedded system design," in Proc. Des. Autom. Conf., 2004, pp. 753-760.
-
(2004)
Proc. Des. Autom. Conf
, pp. 753-760
-
-
Kocher, P.1
Lee, R.B.2
McGraw, G.3
Raghunathan, A.4
Ravi, S.5
-
5
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
D. V. Klein, "Foiling the cracker: A survey of, and improvements to, password security," in Proc. Workshop USENIX Security, 1990, pp. 5-14.
-
(1990)
Proc. Workshop USENIX Security
, pp. 5-14
-
-
Klein, D.V.1
-
7
-
-
0003987134
-
-
A. Jain, R. Bolle, and S. Pankanti, Eds, Norwell, MA: Kluwer
-
A. Jain, R. Bolle, and S. Pankanti, Eds., Biometrics: Personal Identification in Networked Society. Norwell, MA: Kluwer, 2002.
-
(2002)
Biometrics: Personal Identification in Networked Society
-
-
-
8
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Nov
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J., vol. 40, pp. 614-634. Nov. 2001.
-
(2001)
IBM Syst. J
, vol.40
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
9
-
-
29144526436
-
Platform-based design for an embedded fingerprint authentication device
-
Dec
-
P. Schaumont, D. Hwang, and I. Verbauwhede, "Platform-based design for an embedded fingerprint authentication device," IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst., vol. 24, no. 12, pp. 1929-1936, Dec. 2005.
-
(2005)
IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst
, vol.24
, Issue.12
, pp. 1929-1936
-
-
Schaumont, P.1
Hwang, D.2
Verbauwhede, I.3
-
10
-
-
27944460383
-
Efficient fingerprint-based user authentication for embedded systems
-
P. Gupta, S. Ravi, A. Raghunathan, and N. K. Jha, "Efficient fingerprint-based user authentication for embedded systems." in Proc. Des. Autom. Conf., 2005, pp. 244-247.
-
(2005)
Proc. Des. Autom. Conf
, pp. 244-247
-
-
Gupta, P.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
11
-
-
34247113109
-
-
Xtensa Application Specific Microprocessor Solutions - Overview Handbook Tensilica Inc., Santa Clara, CA, 2001 [Online]. Available: http://www.tensilica.com
-
"Xtensa Application Specific Microprocessor Solutions - Overview Handbook" Tensilica Inc., Santa Clara, CA, 2001 [Online]. Available: http://www.tensilica.com
-
-
-
-
13
-
-
0031185845
-
Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection
-
Jul
-
P. Belhumeur, J. Hespanha, and D. Kriegman, "Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection," IEEE Trans. Pattern Anal. Mach. Intell., vol. 19, no. 7, pp. 711-720, Jul. 1997.
-
(1997)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.19
, Issue.7
, pp. 711-720
-
-
Belhumeur, P.1
Hespanha, J.2
Kriegman, D.3
-
14
-
-
0007777877
-
Face verification using client specific Fisherfaces
-
Y. Li, J. Kitller, and J. Matas, "Face verification using client specific Fisherfaces," in Proc. Int. Conf. Statistics Directions, Shapes Images, 2000, pp. 63-66.
-
(2000)
Proc. Int. Conf. Statistics Directions, Shapes Images
, pp. 63-66
-
-
Li, Y.1
Kitller, J.2
Matas, J.3
-
15
-
-
4544261132
-
Independent component analysis for face authentication
-
C. Havran, L. Hupet, and J. Czyz, "Independent component analysis for face authentication," in Proc. Knowledge-Based Intell., Inf. Eng. Syst., 2002, pp. 1207-1211.
-
(2002)
Proc. Knowledge-Based Intell., Inf. Eng. Syst
, pp. 1207-1211
-
-
Havran, C.1
Hupet, L.2
Czyz, J.3
-
16
-
-
0031187375
-
Face recognition by elastic bunch graph matching
-
Jul
-
L. Wiskott, J.-M. Fellous, and N. Krüger, "Face recognition by elastic bunch graph matching," Pattern Anal. Mach. Intell., vol. 19, pp. 775-779, Jul. 1997.
-
(1997)
Pattern Anal. Mach. Intell
, vol.19
, pp. 775-779
-
-
Wiskott, L.1
Fellous, J.-M.2
Krüger, N.3
-
17
-
-
84898808599
-
A Bayesian similarity measure for direct image matching
-
B. Moghaddam, C. Nastar, and A. Pentland, "A Bayesian similarity measure for direct image matching," in Proc. Int. Conf. Pattern Recogn., 1996, pp. 350-358.
-
(1996)
Proc. Int. Conf. Pattern Recogn
, pp. 350-358
-
-
Moghaddam, B.1
Nastar, C.2
Pentland, A.3
-
19
-
-
1842499650
-
Face recognition: A literature survey
-
Dec
-
W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld, "Face recognition: A literature survey," ACM Comput. Survey, vol. 35, pp. 399-458, Dec. 2003.
-
(2003)
ACM Comput. Survey
, vol.35
, pp. 399-458
-
-
Zhao, W.1
Chellappa, R.2
Phillips, P.J.3
Rosenfeld, A.4
-
20
-
-
0037344580
-
A reconfigurable system featuring dynamically extensible embedded microprocessor, FPGA, and customizable I/O
-
Mar
-
M. Borgatti, F. Lertora, B. Foret, and L. Cali, "A reconfigurable system featuring dynamically extensible embedded microprocessor, FPGA, and customizable I/O," IEEE J. Solid-State Circuits, vol. 38, no. 3, pp. 521-529, Mar. 2003.
-
(2003)
IEEE J. Solid-State Circuits
, vol.38
, Issue.3
, pp. 521-529
-
-
Borgatti, M.1
Lertora, F.2
Foret, B.3
Cali, L.4
-
21
-
-
84948734486
-
A PDA-based face recognition system
-
J. Yang, X. Chen, and W. Kunz, "A PDA-based face recognition system," in Proc. Wkshp. Applicat. Comput. Vision, 2002, pp. 19-23.
-
(2002)
Proc. Wkshp. Applicat. Comput. Vision
, pp. 19-23
-
-
Yang, J.1
Chen, X.2
Kunz, W.3
-
22
-
-
34247149230
-
-
Omron Press Release, Kyoto, Japan, OKAO vision face recognition sensor (2005). [Online]. Available: http://www.omron.com/news/n_280205. html
-
Omron Press Release, Kyoto, Japan, "OKAO vision face recognition sensor" (2005). [Online]. Available: http://www.omron.com/news/n_280205. html
-
-
-
-
24
-
-
21844446305
-
Multimodal face and speaker identification on a handheld device
-
T. Hazen, E. Weinstein, R. Kabir, A. Park, and B. Heisele, "Multimodal face and speaker identification on a handheld device," in Proc. Workshop Multimodal User Authentication, 2003, pp. 120-133.
-
(2003)
Proc. Workshop Multimodal User Authentication
, pp. 120-133
-
-
Hazen, T.1
Weinstein, E.2
Kabir, R.3
Park, A.4
Heisele, B.5
-
25
-
-
84905372381
-
Discriminant analysis of principal components for face recognition
-
W. Zhao, R. Chellappa, and A. Krishnaswamy, "Discriminant analysis of principal components for face recognition," in Proc. Int. Conf. Face Gesture Recog., 1998, pp. 336-341.
-
(1998)
Proc. Int. Conf. Face Gesture Recog
, pp. 336-341
-
-
Zhao, W.1
Chellappa, R.2
Krishnaswamy, A.3
-
26
-
-
25144471298
-
Score normalization in multimodal biometric systems
-
Dec
-
A. K. Jain, K. Nandakumar, and A. Ross, "Score normalization in multimodal biometric systems," Pattern Recog., vol. 38, pp. 2270-2285, Dec. 2005.
-
(2005)
Pattern Recog
, vol.38
, pp. 2270-2285
-
-
Jain, A.K.1
Nandakumar, K.2
Ross, A.3
-
27
-
-
4544263010
-
-
Colorado State Univ, Boulder, Online, Available
-
"Evaluation of face recognition algorithms," Colorado State Univ., Boulder, 2003. [Online], Available: http://www.cs.colostate.edu/eval- facerec
-
(2003)
Evaluation of face recognition algorithms
-
-
-
28
-
-
2542479965
-
A hybrid energy estimation technique for extensible processors
-
May
-
Y. Fei, S. Ravi, A. Raghunathan, and N. K. Jha, "A hybrid energy estimation technique for extensible processors," IEEE Trans. Comput. Aided Des., vol. 23, no. 5, pp. 652-664, May 2004.
-
(2004)
IEEE Trans. Comput. Aided Des
, vol.23
, Issue.5
, pp. 652-664
-
-
Fei, Y.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
29
-
-
13444273565
-
Assuring liveness in biometric identity authentication by real-time face tracking
-
J. Bigun, H. Fronthaler, and K. Kollreider, "Assuring liveness in biometric identity authentication by real-time face tracking," in Proc. IEEE Int. Conf. Computational Intell. Homeland Security Personal Safety, 2004, pp. 104-111.
-
(2004)
Proc. IEEE Int. Conf. Computational Intell. Homeland Security Personal Safety
, pp. 104-111
-
-
Bigun, J.1
Fronthaler, H.2
Kollreider, K.3
-
31
-
-
0034444066
-
Architectural support for fast symmetric-key cryptography
-
J. Burke, J. McDonald, and T. Austin, "Architectural support for fast symmetric-key cryptography," in Proc. Int. Conf. Architectural Support Program. Lang. Operat. Syst., 2000, pp. 178-189.
-
(2000)
Proc. Int. Conf. Architectural Support Program. Lang. Operat. Syst
, pp. 178-189
-
-
Burke, J.1
McDonald, J.2
Austin, T.3
-
33
-
-
0035517885
-
Efficient permutation for fast software cryptography
-
Dec
-
R. B. Lee, Z. Shi, and X. Yang, "Efficient permutation for fast software cryptography," IEEE Micro, vol. 21, no. 12, pp. 56-69, Dec. 2001.
-
(2001)
IEEE Micro
, vol.21
, Issue.12
, pp. 56-69
-
-
Lee, R.B.1
Shi, Z.2
Yang, X.3
-
34
-
-
0036055207
-
System design methodologies for a wireless security processing platform
-
S. Ravi, A. Raghunathan, N. Potlapally, and M. Sankaradass, "System design methodologies for a wireless security processing platform," in Proc. Des. Autom. Conf., 2002, pp. 777-782.
-
(2002)
Proc. Des. Autom. Conf
, pp. 777-782
-
-
Ravi, S.1
Raghunathan, A.2
Potlapally, N.3
Sankaradass, M.4
|