skip to main content
Show Results with:

Results 1 - 10 of 690  for Everything in this catalogue

results 1 2 3 4 5 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Material Type:
Journal
Add to My workspace

IEEE transactions on information forensics and security

New York, NY : IEEE Signal Processing Society, 2006-

Online access

2
Material Type:
Article
Add to My workspace

CASTLE: Enhancing the Utility of Inequality Query Auditing Without Denial Threats

Hou, J. et al.

IEEE transactions on information forensics and security. Volume 13:Issue 7 (2018); pp 1656-1669 -- IEEE Signal Processing Society

Check library holdings

3
Material Type:
Article
Add to My workspace

IEEE Transactions on Information Forensics and Security publication information

IEEE transactions on information forensics and security. Volume 14:Number 6 (2019, May 21st); pp C2-C2 -- IEEE Signal Processing Society

Online access

4
Material Type:
Article
Add to My workspace

IEEE Transactions on Information Forensics and Security publication information

IEEE transactions on information forensics and security. Volume 14:Number 10 (2019, September 24th); pp C2-C2 -- IEEE Signal Processing Society

Online access

5
Material Type:
Article
Add to My workspace

Age-Related Factor Guided Joint Task Modeling Convolutional Neural Network for Cross-Age Face Recognition

Li, Haoxi; Hu, Haifeng; Yip, Chitung

IEEE transactions on information forensics and security. Volume 13:Issue 9 (2018); pp 2383-2392 -- IEEE Signal Processing Society

Check library holdings

6
Material Type:
Article
Add to My workspace

Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding

Perazzone, Jake Bailey et al.

IEEE transactions on information forensics and security. Volume 13:Issue 9 (2018); pp 2216-2225 -- IEEE Signal Processing Society

Check library holdings

7
Material Type:
Article
Add to My workspace

Fingerprint Spoof Buster: Use of Minutiae-Centered Patches

Chugh, Tarang; Cao, Kai; Jain, Anil K.

IEEE transactions on information forensics and security. Volume 13:Issue 9 (2018); pp 2190-2202 -- IEEE Signal Processing Society

Check library holdings

8
Material Type:
Article
Add to My workspace

Indistinguishability and Energy Sensitivity of Gaussian and Bernoulli Compressed Encryption

Yu, N. Y.

IEEE transactions on information forensics and security. Volume 13:Issue 7 (2018); pp 1722-1735 -- IEEE Signal Processing Society

Check library holdings

9
Material Type:
Article
Add to My workspace

IEEE Transactions on Information Forensics and Security Edics

IEEE transactions on information forensics and security. Volume 13:Number 12 (2018, November 20th); pp 3180-3180 -- IEEE Signal Processing Society

Online access

10
Material Type:
Article
Add to My workspace

Table of contents

IEEE transactions on information forensics and security. Volume 14:Number 5 (2019, April 22nd); pp 1125-1126 -- IEEE Signal Processing Society

Online access

Results 1 - 10 of 690  for Everything in this catalogue

results 1 2 3 4 5 next page

Refine Search Results

Refine my results

Access Options 

  1. Request to Reading Room  (689)
  2. Online: Reading Room only  (1)
  3. Online  (1)
  4. Refine further open sub menu

Material type 

  1. Articles  (689)
  2. Journals  (1)
  3. Refine further open sub menu

Subject 

  1. Signal processing--Periodicals  (689)
  2. Réseaux d'ordinateurs--Sécurité--Mesures--Périodiques  (689)
  3. Computer networks--Security measures--Periodicals  (689)
  4. Sécurité informatique--Périodiques  (689)
  5. Scheduling--Downlink--Security--Resource management--Antennas--Wireless communication--Physical layer  (3)
  6. Computer crime--Privacy--Bandwidth--Cloud computing--Protocols--Computer architecture  (3)
  7. Finger vein recognition--soft biometric trait--vein imaging principle--intensity distribution  (3)
  8. Physical layer security--secrecy rate--potential eavesdropper--downlink--opportunistic user scheduling--artificial noise transmission--power allocation  (3)
  9. Transform coding--Distortion--Discrete cosine transforms--Security--Cost function--Computational complexity--Microscopy  (3)
  10. Video anomaly detection--squirrel-cage local binary pattern--motion descriptor  (3)
  11. Trajectory--Rotors--Dynamics--Anomaly detection--Feature extraction--Histograms--Lighting  (3)
  12. Steganography--distortion--JPEG--microscale  (3)
  13. Authentication--Encryption--Throughput--Multicore processing--Receivers--Transmitters  (3)
  14. Arbiter PUF--reliability enhancement--machine learning attack resistance--authentication protocol  (3)
  15. Field programmable gate arrays--Reliability--Authentication--Hardware--Servers--Machine learning--Resistance  (3)
  16. DDoS attacks--privacy-preserving--ISPs--immediate deployability  (3)
  17. Veins--Thumb--Feature extraction--Biomedical imaging--Shape  (3)
  18. RFID--cloned tags--unreconciled collisions--Aloha  (3)
  19. Authentication--encryption--AES-CCM--multicore--asynchronous circuit--key adjusting technique  (3)
  20. Watermarking--Software--Payloads--Protocols--Semantics--Resilience  (2)
  21. Refine further open sub menu

Creation date 

From To
  1. Before2011  (2)
  2. 2011To2013  (3)
  3. 2014To2015  (25)
  4. 2016To2018  (280)
  5. After 2018  (380)
  6. Refine further open sub menu

Form/Genre 

  1. Article  (689)
  2. Périodiques  (1)
  3. Periodicals  (1)
  4. Refine further open sub menu

Additional Features 

  1. Abstract  (602)
  2. No Abstract  (87)
  3. Refine further open sub menu

Searching Remote Databases, Please Wait