What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kevin W. Bowyer
Google Scholar
ORCID:
0000-0002-7562-4390
17
publications in security and cryptology related venues
Year
Venue
Title
2023
journals/tifs
Comprehensive Study in Open-Set Iris Presentation Attack Detection.
Aidan Boyd
Jeremy Speth
Lucas Parzianello
Kevin W. Bowyer
Adam Czajka
2022
journals/tifs
Gendered Differences in Face Recognition Accuracy Explained by Hairstyles, Makeup, and Facial Morphology.
Vítor Albiero
Kai Zhang
Michael C. King
Kevin W. Bowyer
2021
journals/tifs
Robust Iris Presentation Attack Detection Fusing 2D and 3D Information.
Zhaoyuan Fang
Adam Czajka
Kevin W. Bowyer
2021
journals/tifs
Transformation-Aware Embeddings for Image Provenance.
Aparna Bharati
Daniel Moreira
Patrick J. Flynn
Anderson de Rezende Rocha
Kevin W. Bowyer
Walter J. Scheirer
2019
journals/tifs
Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection.
Andrey Kuehlkamp
Allan da Silva Pinto
Anderson Rocha
Kevin W. Bowyer
Adam Czajka
2017
journals/tifs
Recognition of Image-Orientation-Based Iris Spoofing.
Adam Czajka
Kevin W. Bowyer
Michael Krumdick
Rosaura G. VidalMata
2017
journals/tifs
Face Recognition Using Sparse Fingerprint Classification Algorithm.
Tomas Larrain
John S. Bernhard
Domingo Mery
Kevin W. Bowyer
2016
journals/tifs
Gender Classification From the Same Iris Code Used for Recognition.
Juan E. Tapia
Claudio A. Perez
Kevin W. Bowyer
2016
journals/tifs
Detecting Facial Retouching Using Supervised Deep Learning.
Aparna Bharati
Richa Singh
Mayank Vatsa
Kevin W. Bowyer
2015
journals/tifs
Strong, Neutral, or Weak: Exploring the Impostor Score Distribution.
Amanda Sgroi
Patrick J. Flynn
Kevin W. Bowyer
P. Jonathon Phillips
2014
journals/tifs
Double Trouble: Differentiating Identical Twins by Face Recognition.
Jeffrey R. Paone
Patrick J. Flynn
P. Jonathon Phillips
Kevin W. Bowyer
Richard W. Vorder Bruegge
Patrick Grother
George W. Quinn
Matthew T. Pruitt
Jason M. Grant
2014
journals/tifs
Framework for Active Clustering With Ensembles.
Jeremiah R. Barr
Kevin W. Bowyer
Patrick J. Flynn
2014
journals/tifs
Unraveling the Effect of Textured Contact Lenses on Iris Recognition.
Daksha Yadav
Naman Kohli
James S. Doyle Jr.
Richa Singh
Mayank Vatsa
Kevin W. Bowyer
2012
journals/tifs
A Multialgorithm Analysis of Three Iris Biometric Sensors.
Ryan Connaughton
Amanda Sgroi
Kevin W. Bowyer
Patrick J. Flynn
2012
journals/tifs
Human and Machine Performance on Periocular Biometrics Under Near-Infrared Light and Visible Light.
Karen Hollingsworth
Shelby Solomon Darnell
Philip E. Miller
Damon L. Woodard
Kevin W. Bowyer
Patrick J. Flynn
2009
journals/tifs
Iris recognition using signal-level fusion of frames from video.
Karen Hollingsworth
Tanya Peters
Kevin W. Bowyer
Patrick J. Flynn
2008
journals/tifs
A Region Ensemble for 3-D Face Recognition.
Timothy C. Faltemier
Kevin W. Bowyer
Patrick J. Flynn
Coauthors
Adam Czajka
(4)
Aidan Boyd
(1)
Allan da Silva Pinto
(1)
Amanda Sgroi
(2)
Anderson de Rezende Rocha
(1)
Anderson Rocha
(1)
Andrey Kuehlkamp
(1)
Aparna Bharati
(2)
Claudio A. Perez
(1)
Daksha Yadav
(1)
Damon L. Woodard
(1)
Daniel Moreira
(1)
Domingo Mery
(1)
George W. Quinn
(1)
James S. Doyle Jr.
(1)
Jason M. Grant
(1)
Jeffrey R. Paone
(1)
Jeremiah R. Barr
(1)
Jeremy Speth
(1)
John S. Bernhard
(1)
Juan E. Tapia
(1)
Kai Zhang
(1)
Karen Hollingsworth
(2)
Kevin W. Bowyer
(17)
Lucas Parzianello
(1)
Matthew T. Pruitt
(1)
Mayank Vatsa
(2)
Michael C. King
(1)
Michael Krumdick
(1)
Naman Kohli
(1)
P. Jonathon Phillips
(2)
Patrick Grother
(1)
Patrick J. Flynn
(8)
Philip E. Miller
(1)
Richa Singh
(2)
Richard W. Vorder Bruegge
(1)
Rosaura G. VidalMata
(1)
Ryan Connaughton
(1)
Shelby Solomon Darnell
(1)
Tanya Peters
(1)
Timothy C. Faltemier
(1)
Tomas Larrain
(1)
Vítor Albiero
(1)
Walter J. Scheirer
(1)
Zhaoyuan Fang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to