Search Results for - Narrowed by: Springer Collection - Computer vision. - Data Structures, Cryptology and Information Theory.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AONLINESPR$002509Springer$002bCollection$0026qf$003dSUBJECT$002509Subject$002509Computer$002bvision.$002509Computer$002bvision.$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026ps$003d300?2024-09-26T15:49:50ZVizSEC 2007 Proceedings of the Workshop on Visualization for Computer Securityent://SD_ILS/0/SD_ILS:5033402024-09-26T15:49:50Z2024-09-26T15:49:50Zby Goodall, John R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format: Electronic Resources<br/>Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5038592024-09-26T15:49:50Z2024-09-26T15:49:50Zby Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format: Electronic Resources<br/>Securing Biometrics Applicationsent://SD_ILS/0/SD_ILS:5016522024-09-26T15:49:50Z2024-09-26T15:49:50Zby Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-69933-2">http://dx.doi.org/10.1007/978-0-387-69933-2</a><br/>Format: Electronic Resources<br/>Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036702024-09-26T15:49:50Z2024-09-26T15:49:50Zby Goodall, John R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format: Electronic Resources<br/>Handbook of Biometricsent://SD_ILS/0/SD_ILS:5016622024-09-26T15:49:50Z2024-09-26T15:49:50Zby Jain, Anil K. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-71041-9">http://dx.doi.org/10.1007/978-0-387-71041-9</a><br/>Format: Electronic Resources<br/>Reliable Face Recognition Methods System Design, Impementation and Evaluationent://SD_ILS/0/SD_ILS:5055222024-09-26T15:49:50Z2024-09-26T15:49:50Zby Wechsler, Harry. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-38464-1">http://dx.doi.org/10.1007/978-0-387-38464-1</a><br/>Format: Electronic Resources<br/>Biometrics, Computer Security Systems and Artificial Intelligence Applicationsent://SD_ILS/0/SD_ILS:5054262024-09-26T15:49:50Z2024-09-26T15:49:50Zby Saeed, Khalid. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format: Electronic Resources<br/>Handbook of Multibiometricsent://SD_ILS/0/SD_ILS:5051862024-09-26T15:49:50Z2024-09-26T15:49:50Zby Ross, Arun A. author.<br/><a href="http://dx.doi.org/10.1007/0-387-33123-9">http://dx.doi.org/10.1007/0-387-33123-9</a><br/>Format: Electronic Resources<br/>Understanding Intrusion Detection Through Visualizationent://SD_ILS/0/SD_ILS:5046782024-09-26T15:49:50Z2024-09-26T15:49:50Zby Axelsson, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format: Electronic Resources<br/>Unconstrained Face Recognitionent://SD_ILS/0/SD_ILS:5049212024-09-26T15:49:50Z2024-09-26T15:49:50Zby Zhou, Shaohua Kevin. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29486-5">http://dx.doi.org/10.1007/978-0-387-29486-5</a><br/>Format: Electronic Resources<br/>Human Identification Based on Gaitent://SD_ILS/0/SD_ILS:5049232024-09-26T15:49:50Z2024-09-26T15:49:50Zby Nixon, Mark S. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29488-9">http://dx.doi.org/10.1007/978-0-387-29488-9</a><br/>Format: Electronic Resources<br/>Biometric User Authentication for it Security From Fundamentals to Handwritingent://SD_ILS/0/SD_ILS:5047302024-09-26T15:49:50Z2024-09-26T15:49:50Zby Vielhauer, Claus. author.<br/><a href="http://dx.doi.org/10.1007/0-387-28094-4">http://dx.doi.org/10.1007/0-387-28094-4</a><br/>Format: Electronic Resources<br/>Parallel and Distributed Computing: Applications and Technologies 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004. Proceedingsent://SD_ILS/0/SD_ILS:5097202024-09-26T15:49:50Z2024-09-26T15:49:50Zby Liew, Kim-Meow. editor.<br/><a href="http://dx.doi.org/10.1007/b103538">http://dx.doi.org/10.1007/b103538</a><br/>Format: Electronic Resources<br/>Image and Video Encryption From Digital Rights Management to Secured Personal Communication.ent://SD_ILS/0/SD_ILS:5041662024-09-26T15:49:50Z2024-09-26T15:49:50Zby SpringerLink (Online service)<br/><a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format: Electronic Resources<br/>