Journal articles on the topic '3D security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic '3D security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lizée, Pierre P. "Human Security in Vietnam, Laos, and Cambodia." Contemporary Southeast Asia 24, no. 3 (December 2002): 509–27. http://dx.doi.org/10.1355/cs24-3d.
Full textJansen, David. "Relations among Security and Law Enforcement Institutions in Indonesia." Contemporary Southeast Asia 30, no. 3 (December 2008): 429–54. http://dx.doi.org/10.1355/cs30-3d.
Full textRaval, Dhatri, and Abhilash Shukla. "Security using 3D Password." International Journal of Computer Applications 120, no. 7 (June 18, 2015): 36–38. http://dx.doi.org/10.5120/21242-4024.
Full textGabriëlse, Robbert. "A 3D Approach to Security and Development." Connections: The Quarterly Journal 06, no. 2 (2007): 67–74. http://dx.doi.org/10.11610/connections.06.2.02.
Full textMartín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.
Full textMayer, Frederik, Stefan Richter, Philipp Hübner, Toufic Jabbour, and Martin Wegener. "3D Fluorescence-Based Security Features by 3D Laser Lithography." Advanced Materials Technologies 2, no. 11 (September 21, 2017): 1700212. http://dx.doi.org/10.1002/admt.201700212.
Full textGomes de Almeida, Franklin Epiphanio. "3D PRINTING AND NEW SECURITY THREATS." Revista do Instituto Brasileiro de Segurança Pública (RIBSP) 3, no. 7 (September 2, 2020): 197–210. http://dx.doi.org/10.36776/ribsp.v3i7.92.
Full textKirkpatrick, Keith. "3D sensors provide security, better games." Communications of the ACM 61, no. 6 (May 23, 2018): 15–17. http://dx.doi.org/10.1145/3204449.
Full textZakaria, Abdul Alif, Azni Haslizan Ab Halim, Farida Ridzuan, Nur Hafiza Zakaria, and Maslina Daud. "LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application." Symmetry 14, no. 10 (September 30, 2022): 2042. http://dx.doi.org/10.3390/sym14102042.
Full textKaur, Veerpal, Devershi Pallavi Bhatt, Pradeep Kumar Tiwari, and Sumegh Tharewal. "Blockchain technology combined with the CNN and Hashing algorithms enabled the secure storage of 3D biometric face and ear data." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 729–38. http://dx.doi.org/10.47974/jdmsc-1745.
Full textKerboua, Adlen, and Mohamed Batouche. "3D Skeleton Action Recognition for Security Improvement." International Journal of Intelligent Systems and Applications 11, no. 3 (March 8, 2019): 42–52. http://dx.doi.org/10.5815/ijisa.2019.03.05.
Full textLi Yu, L. Harrison, Aidong Lu, Zhiwei Li, and Weichao Wang. "3D Digital Legos for Teaching Security Protocols." IEEE Transactions on Learning Technologies 4, no. 2 (April 2011): 125–37. http://dx.doi.org/10.1109/tlt.2010.19.
Full textXie, Yang, Chongxi Bao, Caleb Serafy, Tiantao Lu, Ankur Srivastava, and Mark Tehranipoor. "Security and Vulnerability Implications of 3D ICs." IEEE Transactions on Multi-Scale Computing Systems 2, no. 2 (April 1, 2016): 108–22. http://dx.doi.org/10.1109/tmscs.2016.2550460.
Full textKoch, D. B. "3D visualization to support airport security operations." IEEE Aerospace and Electronic Systems Magazine 19, no. 6 (June 2004): 23–28. http://dx.doi.org/10.1109/maes.2004.1308826.
Full textBhatnagar, Gaurav, Jonathan Wu, and Balasubramanian Raman. "A robust security framework for 3D images." Journal of Visualization 14, no. 1 (December 9, 2010): 85–93. http://dx.doi.org/10.1007/s12650-010-0067-5.
Full textYang, Chengshuai, Yuyang Ding, Jinyang Liang, Fengyan Cao, Dalong Qi, Tianqing Jia, Zhenrong Sun, et al. "Compressed 3D Image Information and Communication Security." Advanced Quantum Technologies 1, no. 2 (June 22, 2018): 1800034. http://dx.doi.org/10.1002/qute.201800034.
Full textZeltmann, Steven Eric, Nikhil Gupta, Nektarios Georgios Tsoutsos, Michail Maniatakos, Jeyavijayan Rajendran, and Ramesh Karri. "Manufacturing and Security Challenges in 3D Printing." JOM 68, no. 7 (May 11, 2016): 1872–81. http://dx.doi.org/10.1007/s11837-016-1937-7.
Full textAli, Nashwan Alsalam, Abdul Monem S. Rahma, and Shaimaa H. Shaker. "Multi-level encryption for 3D mesh model based on 3D Lorenz chaotic map and random number generator." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 6 (December 1, 2022): 6486. http://dx.doi.org/10.11591/ijece.v12i6.pp6486-6495.
Full textNikam, Nilima D., and Amol P. Pande. "Two Way Authentication System 3D Password-3 Levels of Security." International Journal of Scientific Research 3, no. 1 (June 1, 2012): 154–57. http://dx.doi.org/10.15373/22778179/jan2014/50.
Full textФиляк, Петр Юрьевич, Денис Алексеевич Пажинцев, Илья Алексеевич Тырин, Александр Григорьевич Остапенко, and Юрий Юрьевич Громов. "3D PRINTERS - REALITY AND FUTURE. ASPECTS OF INFORMATION SECURITY." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 4(-) (December 25, 2020): 525–34. http://dx.doi.org/10.36622/vstu.2020.23.4.005.
Full textLiu, Yiqun, Xiaorui Wang, Jianqi Zhang, Minqing Zhang, Peng Luo, and Xu An Wang. "An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem." International Journal of Technology and Human Interaction 12, no. 2 (April 2016): 1–21. http://dx.doi.org/10.4018/ijthi.2016040101.
Full textSun, Ning, Sai Tang, Ju Zhang, Jiaxin Wu, and Hongwei Wang. "Food Security: 3D Dynamic Display and Early Warning Platform Construction and Security Strategy." International Journal of Environmental Research and Public Health 19, no. 18 (September 6, 2022): 11169. http://dx.doi.org/10.3390/ijerph191811169.
Full textPark, Young-Tae, and Dae-Ho Lee. "3D Vision-based Security Monitoring for Railroad Stations." Journal of the Optical Society of Korea 14, no. 4 (December 25, 2010): 451–57. http://dx.doi.org/10.3807/josk.2010.14.4.451.
Full textNguyen, Vu Duc, Yang-Wai Chow, and Willy Susilo. "On the security of text-based 3D CAPTCHAs." Computers & Security 45 (September 2014): 84–99. http://dx.doi.org/10.1016/j.cose.2014.05.004.
Full textLiu, Yuntao, Daniel Xing, Isaac McDaniel, Olsan Ozbay, Abir Akib, Mumtahina Islam Sukanya, Sanjay Rekhi, and Ankur Srivastava. "Security Advantages and Challenges of 3D Heterogeneous Integration." Computer 57, no. 3 (March 2024): 107–12. http://dx.doi.org/10.1109/mc.2023.3340798.
Full textДурлевич, С. Р. "Computer synthesis of diffractive optical elements for forming 3D images." Numerical Methods and Programming (Vychislitel'nye Metody i Programmirovanie), no. 1 (February 28, 2017): 11–19. http://dx.doi.org/10.26089/nummet.v18r102.
Full textLiu, Si Ping. "Research on Cloud Computing Strategy Based on Security Model." Applied Mechanics and Materials 644-650 (September 2014): 1835–39. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.1835.
Full textHiguchi, Kazutoshi, Mitsuru Kaise, Hiroto Noda, Go Ikeda, Teppei Akimoto, Hiroshi Yamawaki, Osamu Goto, Nobue Ueki, Seiji Futagami, and Katsuhiko Iwakiri. "Usefulness of 3-Dimensional Flexible Endoscopy in Esophageal Endoscopic Submucosal Dissection in an Ex Vivo Animal Model." Gastroenterology Research and Practice 2019 (November 3, 2019): 1–5. http://dx.doi.org/10.1155/2019/4051956.
Full textLuo, Ting, Liwen Zuo, Gangyi Jiang, Wei Gao, Haiyong Xu, and Qiuping Jiang. "Security of MVD-based 3D video in 3D-HEVC using data hiding and encryption." Journal of Real-Time Image Processing 17, no. 4 (September 5, 2018): 773–85. http://dx.doi.org/10.1007/s11554-018-0817-5.
Full textChen, Jin Mu, Chun Lin Zhang, Ren De Wang, Xian Feng Lu, Wei Wang, Xun Feng Wang, and Xiao Jun Shen. "Preliminary Application of Terrestrial 3D LiDar in Corridor Defects Detection of Overhead Transmission Lines." Advanced Materials Research 718-720 (July 2013): 918–22. http://dx.doi.org/10.4028/www.scientific.net/amr.718-720.918.
Full textFelsenstein, Christoph, Knud Benedict, and Michael Baldauf. "Maritime Safety and Security Challenges – 3D Simulation Based Training." TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation 7, no. 3 (2013): 327–36. http://dx.doi.org/10.12716/1001.07.03.02.
Full textKim, Donghyun, and Seoksoo Kim. "Design of 3D Contents Augmented Method using XML Security." Journal of Security Engineering 14, no. 2 (April 30, 2017): 181–88. http://dx.doi.org/10.14257/jse.2017.04.09.
Full textZhao, Wei, Lingling Wu, Baogang Li, Hui Bao, and Chunxiu Zhang. "Physical Layer Security Performance Based on 3D Heterogeneous Network." Wireless Communications and Mobile Computing 2018 (2018): 1–7. http://dx.doi.org/10.1155/2018/2753614.
Full textSonkar S.K, Prof, and Author Dr.Ghungrad.S.B. "Minimum Space and Huge Security in 3D Password Scheme." International Journal of Computer Applications 29, no. 4 (September 29, 2011): 35–40. http://dx.doi.org/10.5120/3552-4872.
Full textZhang, Yuchong, Xiaoxia Le, Yukun Jian, Wei Lu, Jiawei Zhang, and Tao Chen. "3D Fluorescent Hydrogel Origami for Multistage Data Security Protection." Advanced Functional Materials 29, no. 46 (September 6, 2019): 1905514. http://dx.doi.org/10.1002/adfm.201905514.
Full textYan, Wenhao, Zijing Jiang, Xin Huang, and Qun Ding. "A Three-Dimensional Infinite Collapse Map with Image Encryption." Entropy 23, no. 9 (September 17, 2021): 1221. http://dx.doi.org/10.3390/e23091221.
Full textSalih, Adnan Ibrahem, Ashwaq Mahmood Alabaichi, and Ammar Yaseen Tuama. "Enhancing advance encryption standard security based on dual dynamic XOR table and MixColumns transformation." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (September 1, 2020): 1574. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1574-1581.
Full textMiroslav, Marcanik, Sustek Michal, and Jasek Roman. "3D sensors in critical infrastructure." MATEC Web of Conferences 210 (2018): 04034. http://dx.doi.org/10.1051/matecconf/201821004034.
Full textWang, Yajing, Yaodong Yang, Shuaipeng Suo, Mingyuan Wang, and Weifeng Rao. "Using Blockchain to Protect 3D Printing from Unauthorized Model Tampering." Applied Sciences 12, no. 15 (August 8, 2022): 7947. http://dx.doi.org/10.3390/app12157947.
Full textJohn, Siju, and S. N. Kumar. "6D Hyperchaotic Encryption Model for Ensuring Security to 3D Printed Models and Medical Images." Journal of Image and Graphics 12, no. 2 (2024): 117–26. http://dx.doi.org/10.18178/joig.12.2.117-126.
Full textLiu, Hongjun, Abdurahman Kadir, and Chengbo Xu. "Color Image Encryption with Cipher Feedback and Coupling Chaotic Map." International Journal of Bifurcation and Chaos 30, no. 12 (September 30, 2020): 2050173. http://dx.doi.org/10.1142/s0218127420501734.
Full textCalafate, Carlos T., and Mauro Tropea. "Unmanned Aerial Vehicles—Platforms, Applications, Security and Services." Electronics 9, no. 6 (June 11, 2020): 975. http://dx.doi.org/10.3390/electronics9060975.
Full textZhang, Jing, Aimin Yan, and Hongbo Zhang. "Asymmetric Encryption of Invisible Structured Light 3D Imaging." Applied Sciences 12, no. 7 (March 31, 2022): 3563. http://dx.doi.org/10.3390/app12073563.
Full textCultice, Tyler, Joseph Clark, Wu Yang, and Himanshu Thapliyal. "A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World." Sensors 23, no. 24 (December 17, 2023): 9886. http://dx.doi.org/10.3390/s23249886.
Full textZhou, Ye, Junjun Yu, Liuyan Pan, Yi Wang, and Qunsheng Cao. "3D MIMO imaging architecture for walk through personnel security screening." IET Microwaves, Antennas & Propagation 12, no. 14 (September 17, 2018): 2206–12. http://dx.doi.org/10.1049/iet-map.2018.5299.
Full textWalther, Gerald. "Printing Insecurity? The Security Implications of 3D-Printing of Weapons." Science and Engineering Ethics 21, no. 6 (December 18, 2014): 1435–45. http://dx.doi.org/10.1007/s11948-014-9617-x.
Full textMerlin, Livingston L. M., Livingston L. G. X. Agnel, and Livingston L. M. Jenila. "MULTIMEDIA SECURITY SPOOFING OF DIGITAL IMAGE FORENSICS -3D FACE MASK." International Journal of Scientific and Engineering Research 7, no. 5 (May 25, 2016): 320–28. http://dx.doi.org/10.14299/ijser.2016.05.001.
Full textKhan, Aslam A., Chengji Xi, and Navid Asadizanjani. "Physical Security Roadmap for Heterogeneous Integration Technology." EDFA Technical Articles 24, no. 2 (May 1, 2022): 24–32. http://dx.doi.org/10.31399/asm.edfa.2022-2.p024.
Full textLiu, Pai, Shihua Zhou, and Wei Qi Yan. "A 3D Cuboid Image Encryption Algorithm Based on Controlled Alternate Quantum Walk of Message Coding." Mathematics 10, no. 23 (November 24, 2022): 4441. http://dx.doi.org/10.3390/math10234441.
Full textRahayu, Rivi Tri, Abduh Riski, and Ahmad Kamsyakawuni. "PENYANDIAN CITRA MENGGUNAKAN ALGORITMA 4D PLAYFAIR CIPHER DENGAN PEMBANGKITAN KUNCI MODIFIKASI LINEAR FEEDBACK SHIFT REGISTER." Majalah Ilmiah Matematika dan Statistika 19, no. 1 (March 1, 2019): 17. http://dx.doi.org/10.19184/mims.v19i1.17261.
Full text