IEEE 2013 - INFORMATION FORENSICS AND SECURITY TITLES
Project Code | Title |
IFS1301 | Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions. |
IFS1302 | User Authentication Through Mouse Dynamics. |
IFS1303 | Latent Fingerprint Matching Using Descriptor-Based Hough Transform. |
IFS1304 | Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection. |
IFS1305 | Robust Hashing for Image Authentication Using Zernike Moments and Local Features. |
IFS1306 | An Optimized Wavelength Band Selection for Heavily Pigmented Iris Recognition |
IFS1307 | White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures. |
IFS1308 | Recognizing Surgically Altered Face Images Using Multi-objective Evolutionary Algorithm. |
IFS1309 | Heap Graph Based Software Theft Detection. |
IFS1310 | Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. |
IFS1311 | Face Recognition and Verification Using Photometric Stereo: The Photoface Database and a Comprehensive Evaluation. |
IFS1312 | Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. |
IFS1313 | On the Security of End-to-End Measurements Based on Packet-Pair Dispersions. |
IFS1314 | COKE Crypto-Less Over-the-Air Key Establishment. |
IFS1315 | An Evaluation of Otoacoustic Emissions as a Biometric. |
IFS1316 | A Real-Time Design Based on FPGA for Expeditious Error Reconciliation in QKD System. |
IFS1317 | Matching Composite Sketches to Face Photos: A Component-Based Approach. |
IFS1318 | Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes. |
IFS1319 | Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography. |
IFS1320 | Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems. |
IFS1321 | Component-Based Representation in Automated Face Recognition. |
IFS1322 | Physical Layer Security of TAS/MRC With Antenna Correlation. |
IFS1323 | On Mixing Fingerprints. . |
IFS1324 | Covert Channels in Computer Networks Based on Chaos Theory. |
IFS1325 | Online/Offline Signatures for Low-Power Devices. |
IFS1326 | Exploring Patterns of Gradient Orientations and Magnitudes for Face Recognition. |
IFS1327 | Robust Biometric Score Fusion by Naive Likelihood Ratio via Receiver Operating Characteristics. |
IFS1328 | On Energy-Secrecy Trade-Offs for Gaussian Wiretap Channels. |
IFS1329 | Strong Secrecy in Bidirectional Broadcast Channels With Confidential Messages. |
IFS1330 | Revealing the Traces of JPEG Compression Anti-Forensics. |
IFS1331 | Fingerprint Combination for Privacy Protection. |
IFS1332 | Effect of Cover Quantization on Steganographic Fisher Information. |
IFS1333 | Sparse Matching of Salient Facial Curves for Recognition of 3-D Faces With Missing Parts. |
IFS1334 | Secure RFID Tag Ownership Transfer Based on Quadratic Residues. |
IFS1335 | Privacy Preserving Data Sharing With Anonymous ID Assignment. |
IFS1336 | On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT. |
IFS1337 | Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems. |
IFS1338 | Increasing Security Degree of Freedom in Multiuser and Multieve Systems. |
IFS1339 | The Source Identification Game: An Information-Theoretic Perspective. |
IFS1340 | An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection. |
IFS1341 | A Timing Channel Spyware for the CSMA/CA Protocol. |
IFS1342 | Gender Classification Based on Fusion of Different Spatial Scale Features Selected by Mutual Information From Histogram of |
IFS1343 | SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection. |
IFS1344 | Cost-Sensitive Subspace Analysis and Extensions for Face Recognition. |
IFS1345 | A New Method for EEG-Based Concealed Information Test. |
IFS1346 | Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes |
IFS1347 | . A Study on Reconstruction of Linear Scrambler Using Dual Words of Channel Encoder. |
IFS1348 | Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. |
IFS1349 | Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing. |
IFS1350 | JPEG Image Steganalysis Using Multivariate PDF Estimates With MRF Cliques. |
IFS1351 | A Framework for Decision Fusion in Image Forensics Based on Dempster-Shafer Theory of Evidence. |
IFS1352 | Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection. |
IFS1353 | Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks. |
IFS1354 | Joint Global and Local Structure Discriminant Analysis. |
IFS1355 | Trade-Off Between Security and Performance in Block Ciphered Systems With Erroneous Ciphertexts. |
IFS1356 | Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map. |
IFS1357 | A Novel Electronic English Auction System With a Secure On-Shelf Mechanism. |
IFS1358 | Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code. |
IFS1359 | Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security. |
IFS1360 | Payload Attribution via Character Dependent Multi-Bloom Filters. |
IFS1361 | Physical-Layer Security in Distributed Wireless Networks Using Matching Theory. |
IFS1362 | General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes. |
IFS1363 | Electrical Network Frequency (ENF) Maximum-Likelihood Estimation Via a Multitone Harmonic Model. |
IFS1364 | Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks. |
IFS1365 | Hashing Based Fast Palmprint Identification for Large-Scale Databases. |
IFS1366 | Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding. |
IFS1367 | 3-D Face Recognition Under Occlusion Using Masked Projection. |
IFS1368 | Related Key Chosen IV Attack on Grain-128a Stream Cipher. |
IFS1369 | Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware. |
IFS1370 | Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data. |
IFS1371 | Guest Editorial: Special issue on privacy and trust management in cloud and distributed systems. |
IFS1372 | Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach. |
IFS1373 | Automatic General-Purpose Sanitization of Textual Documents. |
IFS1374 | A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for k-NN Search. |
IFS1375 | TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing. |
IFS1376 | Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. |
IFS1377 | Distributed Architecture With Double-Phase Microaggregation for the Private Sharing of Biomedical Data in Mobile Health. |
IFS1378 | Comparative Study of Trust Modeling for Automatic Landmark Tagging. |
IFS1379 | LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks |
IFS1380 | Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis. |
IFS1381 | A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model. |
IFS1382 | Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds. |
IFS1383 | Towards Trustworthy Resource Scheduling in Clouds |
IFS1384 | CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. |
IFS1385 | The Individuality of Relatively Permanent Pigmented or Vascular Skin Marks (RPPVSM) in Independently and Uniformly Distributed Patterns. |
IFS1386 | Fine-Grained Refinement on TPM-Based Protocol Applications. |
IFS1387 | FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment. |
IFS1388 | Impacts of Watermarking Security on Tardos-Based Fingerprinting. |
IFS1389 | Adaptive Quality-Based Performance Prediction and Boosting for Iris Authentication: Methodology and Its Illustration. |
IFS1390 | A Formal Usability Constraints Model for Watermarking of Outsourced Datasets. |
No comments:
Post a Comment