Gotowa bibliografia na temat „3D security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „3D security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "3D security"
Lizée, Pierre P. "Human Security in Vietnam, Laos, and Cambodia". Contemporary Southeast Asia 24, nr 3 (grudzień 2002): 509–27. http://dx.doi.org/10.1355/cs24-3d.
Pełny tekst źródłaJansen, David. "Relations among Security and Law Enforcement Institutions in Indonesia". Contemporary Southeast Asia 30, nr 3 (grudzień 2008): 429–54. http://dx.doi.org/10.1355/cs30-3d.
Pełny tekst źródłaRaval, Dhatri, i Abhilash Shukla. "Security using 3D Password". International Journal of Computer Applications 120, nr 7 (18.06.2015): 36–38. http://dx.doi.org/10.5120/21242-4024.
Pełny tekst źródłaGabriëlse, Robbert. "A 3D Approach to Security and Development". Connections: The Quarterly Journal 06, nr 2 (2007): 67–74. http://dx.doi.org/10.11610/connections.06.2.02.
Pełny tekst źródłaMartín del Rey, A., J. L. Hernández Pastora i G. Rodríguez Sánchez. "3D medical data security protection". Expert Systems with Applications 54 (lipiec 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.
Pełny tekst źródłaMayer, Frederik, Stefan Richter, Philipp Hübner, Toufic Jabbour i Martin Wegener. "3D Fluorescence-Based Security Features by 3D Laser Lithography". Advanced Materials Technologies 2, nr 11 (21.09.2017): 1700212. http://dx.doi.org/10.1002/admt.201700212.
Pełny tekst źródłaGomes de Almeida, Franklin Epiphanio. "3D PRINTING AND NEW SECURITY THREATS". Revista do Instituto Brasileiro de Segurança Pública (RIBSP) 3, nr 7 (2.09.2020): 197–210. http://dx.doi.org/10.36776/ribsp.v3i7.92.
Pełny tekst źródłaKirkpatrick, Keith. "3D sensors provide security, better games". Communications of the ACM 61, nr 6 (23.05.2018): 15–17. http://dx.doi.org/10.1145/3204449.
Pełny tekst źródłaZakaria, Abdul Alif, Azni Haslizan Ab Halim, Farida Ridzuan, Nur Hafiza Zakaria i Maslina Daud. "LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application". Symmetry 14, nr 10 (30.09.2022): 2042. http://dx.doi.org/10.3390/sym14102042.
Pełny tekst źródłaKaur, Veerpal, Devershi Pallavi Bhatt, Pradeep Kumar Tiwari i Sumegh Tharewal. "Blockchain technology combined with the CNN and Hashing algorithms enabled the secure storage of 3D biometric face and ear data". Journal of Discrete Mathematical Sciences & Cryptography 26, nr 3 (2023): 729–38. http://dx.doi.org/10.47974/jdmsc-1745.
Pełny tekst źródłaRozprawy doktorskie na temat "3D security"
Rolland-Nevière, Xavier. "Tatouage 3D robuste". Thesis, Nice, 2014. http://www.theses.fr/2014NICE4083/document.
Pełny tekst źródła3D models are valuable assets widely used in the industry and likely to face piracy issues. This dissertation deals with robust mesh watermarking that is used for traitor-Tracing. Following a review of state-Of-The-Art 3D watermarking systems, the robustness of several content adaptation transforms are benchmarked. An embedding domain robust against pose is investigated, with a thickness estimation based on a robust distance function to a point cloud constructed from some mesh diameters. A benchmark showcases the performance of this domain that provides a basis for robust watermarking in 3D animations. For static meshes, modulating the radial distances is an efficient approach to watermarking. It has been formulated as a quadratic programming problem minimizing the geometric distortion while embedding the payload in the radial distances. This formulation is leveraged to create a robust watermarking framework, with the integration of the spread-Transform, integral reference primitives, arbitrarily selected relocation directions and alternate metrics to minimize the distortion perceived. Benchmarking results showcase the benefits of these add-Ons w.r.t the fidelity vs. robustness watermarking trade-Off. The watermark security is then investigated with two obfuscation mechanisms and a series of attacks that highlight the remaining limitations. A resynchronization approach is finally integrated to deal with cropping attacks. The resynchronization embeds land-Marks in a configuration that conveys synchronization information that will be lost after cropping. During the decoding, this information is blindly retrieved and significant robustness improvements are achieved
Musa, Shahrulniza. "Visualising network security attacks with multiple 3D visualisation and false alert classification". Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/14241.
Pełny tekst źródłaNunnally, Troy J. "Advanced visualizations for network security". Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52993.
Pełny tekst źródłaBishop, Craig, Ian Armstrong i Rolando Navarette. "A Novel Method for 3D Printing High Conductivity Alloys for UHF Applications". International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577400.
Pełny tekst źródłaTraditional approaches to constructing 3D structural electronics with conductive and dielectric materials include ink-jet printed, silver-bearing ink and fine copper wire meshes. One approach combines stereo-lithographic 3D-printed photo-polymers with direct-printed silver-bearing conductive inks. Results have shown 3D conductive structures with conductivities in the range 2x10⁶ to 1x10⁷ S/m using annealing temperatures ranging from 110°C to 150°C for 10 to 15 minutes. However, the stereo-lithographic approach suffers from the high cost of the printer and structural deformation during annealing. This paper presents a new method for 3d printing high conductivity metal alloys using consumer-grade 3D printer. The design and construction of the necessary modification will be presented in addition to the new 3D design process. The method yields metal structures with expected conductivities exceeding 2.6x10⁶ S/m. The process is performed without an annealing step, so the polymeric structural material is not exposed to high temperatures for any prolonged time. A UHF ISM band antenna is constructed for an RFID application using this method, the antenna performance is measured, and the results are compared simulations in Ansys HFSS. This new method can reduce total cost, and several low melting-point alloys could raise the conductivity.
Thomas, Andrew Scott. "Exploring the Efficiency of Software-Defined Radios in 3D Heat Mapping". BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/7754.
Pełny tekst źródłaMouton, Andre. "On artefact reduction, segmentation and classification of 3D computed tomography imagery in baggage security screening". Thesis, Cranfield University, 2014. http://dspace.lib.cranfield.ac.uk/handle/1826/8501.
Pełny tekst źródłaNorwood, Charles Ellis. "Demonstration of Vulnerabilities in Globally Distributed Additive Manufacturing". Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/99104.
Pełny tekst źródłaMaster of Science
Developed at the end of the 20th century, additive manufacturing, sometimes known as 3D printing, is a relatively new method for the production of physical products. Typically, these have been limited to plastics and a small number of metals. Recently, advances in additive manufacturing technology have allowed an increasing number of industrial and consumer products to be produced on demand. A worldwide industry of additive manufacturing has opened up where product designers and 3D printer operators can work together to deliver products to customers faster and more efficiently. Designers and printers may be on opposite sides of the world, but a customer can go to a local printer and order a part designed by an engineer thousands of miles away. The customer receives a part in as little time as it takes to physically produce the object. To achieve this, the printer needs manufacturing information such as object dimensions, material parameters, and machine settings from the designer. The designer risks unauthorized use and the loss of intellectual property if the manufacturing information is exposed. Legal protections on intellectual property only go so far, especially across borders. Technical solutions can help protect valuable IP. In such an industry, essential data may be digitally encrypted for secure transmission around the world. This information may only be read by authorized printers and printing services and is never saved or read by an outside person or computer. The control computers which read the data also control the physical operation of the printer. Most commonly, electric motors are used to move the machine to produce the physical object. These are most often stepper motors which are connected by wires to the controlling computers and move in a predictable rhythmic fashion. The signals transmitted through the wires generate a magnetic field, which can be detected and recorded. The pattern of the magnetic field matches the steps of the motors. Each step can be counted, and the path of the motors can be precisely traced. The path reveals the shape of the object and the encrypted manufacturing instructions used by the printer. This thesis demonstrates the tracking of motors and creation of encrypted machine code in a simulated 3D printing environment, revealing a potential security flaw in a distributed manufacturing system.
Peña, Guevara Javier Nilo, Acuña Leslie Dueñas i Lynch Oscar Dupuy. "Distribuidores exclusivos de la marca MADPAX en el Perú". Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/626040.
Pełny tekst źródłaThis research covers an import business of retail, which the aim idea is the exclusive distribution of the most important foreign brand of innovate backpacks to the national market and lastly make an identity to put us in the target market’s top of mind. This project contains these important topics which represent each chapter like: General aspects of global business, strategic plan about the thorough analysis of the internal and external factors, target market research and work out, advertising plan of brand, import operations plan, organizational structure and human resources, ultimately financial economic plan. The main focus is proving the feasibility of this business through a detailed examination of relevant indicators which show the proposed project profitability.
Trabajo de investigación
Beugnon, Sébastien. "Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie". Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS097.
Pełny tekst źródłaWith the increase of data exchange and latest technological and social developments, multimedia contents are becoming an important part of global trafic. Today, 3D objects are used in a large number of applications, for example, medical applications, simulations, video games, animation and special effects. 3D object usage by the general public has become a lucrative market that can take the form of 3D object downloading platforms with various 3D formats.This thesis, in collaboration with the company STRATEGIES, concerns the 3D object protection, and more particularly 3D meshes against fradulent and illegal uses. These 3D meshes represent surface models of shoes and leather goods produced by customers using digital solutions proposed by STRATEGIES. First, we propose a new method to insert secret data much more efficiently in terms of execution time on very large meshes than the previous method developed in collaboration with the company STRATEGIES. We are also exploring selective encryption approaches to control access to very high quality content according to user needs. In this context, we propose to use selective encryption approaches on the geometric data of 3D objects in order to protect the visual content of these objects according to different use cases and different data representations.In a second research axis, we study the application of secret sharing methods to the domain of 3D objects. Secret sharing is an approach that seeks to divide secret content between multiple users and allows certain subgroups of users to reconstruct the secret. Secret sharing is a redundancy system that allows you to reconstruct the secret even if some users have lost their information. Secret 3D object sharing is a poorly researched domain used to protect a 3D object between collaborators. We propose new secret 3D object sharing methods using selective encryption approaches and providing hierarchical properties where users have different access rights to 3D content based on their position in a hierarchical structure.Finally, the third research axis developed in this thesis deals with the analysis of the visual confidentiality of 3D objects selectively encrypted more or less strongly. Indeed, depending on the scenario, our 3D selective encryption methods provide results that can be more or less recognizable by users. However, the metrics used to evaluate the quality of 3D objects do not distinguish two selectively encrypted 3D objects with different levels of confidentiality. So, we present the construction of a databse of selectively encrypted 3D objects in order to realize subjective assessments of visual confidentiality and try to build a new metric correlated with evaluations obtained by the human visual system
Itier, Vincent. "Nouvelles méthodes de synchronisation de nuages de points 3D pour l'insertion de données cachées". Thesis, Montpellier, 2015. http://www.theses.fr/2015MONTS017/document.
Pełny tekst źródłaThis thesis addresses issues relating to the protection of 3D object meshes. For instance, these objects can be created using CAD tool developed by the company STRATEGIES. In an industrial context, 3D meshes creators need to have tools in order to verify meshes integrity, or check permission for 3D printing for example.In this context we study data hiding on 3D meshes. This approach allows us to insert information in a secure and imperceptible way in a mesh. This may be an identifier, a meta-information or a third-party content, for instance, in order to transmit secretly a texture. Data hiding can address these problems by adjusting the trade-off between capacity, imperceptibility and robustness. Generally, data hiding methods consist of two stages, the synchronization and the embedding. The synchronization stage consists of finding and ordering available components for insertion. One of the main challenges is to propose an effective synchronization method that defines an order on mesh components. In our work, we propose to use mesh vertices, specifically their geometric representation in space, as basic components for synchronization and embedding. We present three new synchronisation methods based on the construction of a Hamiltonian path in a vertex cloud. Two of these methods jointly perform the synchronization stage and the embedding stage. This is possible thanks to two new high-capacity embedding methods (from 3 to 24 bits per vertex) that rely on coordinates quantization. In this work we also highlight the constraints of this kind of synchronization. We analyze the different approaches proposed with several experimental studies. Our work is assessed on various criteria including the capacity and imperceptibility of the embedding method. We also pay attention to security aspects of the proposed methods
Książki na temat "3D security"
Koschan, Andreas, Marc Pollefeys i Mongi Abidi, red. 3D Imaging for Safety and Security. Dordrecht: Springer Netherlands, 2007. http://dx.doi.org/10.1007/978-1-4020-6182-0.
Pełny tekst źródłaKim, Moon S. Defense and security 2008: Special sessions on food safety, visual analytics, resource restricted embedded and sensor networks, and 3D imaging and display : 17-18 March 2008, Orlando, Florida, USA. Redaktor Society of Photo-optical Instrumentation Engineers. Bellingham, Wash: SPIE, 2008.
Znajdź pełny tekst źródłaKoschan, Andreas, Marc Pollefeys i Mongi Abidi. 3D Imaging for Safety and Security. Springer London, Limited, 2007.
Znajdź pełny tekst źródła3d Imaging For Safety And Security. Springer, 2007.
Znajdź pełny tekst źródłaKoschan, Andreas, Marc Pollefeys i Mongi Abidi. 3D Imaging for Safety and Security. Springer, 2010.
Znajdź pełny tekst źródłaBlokdyk, Gerardus. 3D Security a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Znajdź pełny tekst źródłaStrategic Thinking In 3d A Guide For National Security Foreign Policy And Business Professionals. Potomac Books, 2012.
Znajdź pełny tekst źródłaSecurity In Virtual Worlds 3d Webs And Immersive Environments Models For Development Interaction And Management. Information Science Publishing, 2010.
Znajdź pełny tekst źródłaSchmitt, Gary J., i Abram N. Shulsky. Silent Warfare: Understanding the World of Intelligence, 3d Edition. Wyd. 3. Potomac Books Inc., 2002.
Znajdź pełny tekst źródłaGovernment, U. S., U. S. Military i Department of Defense. Additive Manufacturing: Preparing for the Reality of Science Fiction, Emerging Technologies and Homeland Security Public Policy, 3D Printers and Autonomous Vehicles, Unmanned Aerial Systems, Drones. Independently Published, 2016.
Znajdź pełny tekst źródłaCzęści książek na temat "3D security"
Bajpai, Shrish, i Divya Sharma. "Moving towards 3D-biometric". W Digital Image Security, 76–92. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003468974-4.
Pełny tekst źródłaZhu, Yanming, Wei Zhou, Xuefei Yin i Jiankun Hu. "3D Fingerprint". W Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1513-1.
Pełny tekst źródłaZhang, David, i Xu Liang. "3D Palmprint". W Encyclopedia of Cryptography, Security and Privacy, 1–5. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1502-1.
Pełny tekst źródłaCastiglione, Aniello, Michele Nappi, Fabio Narducci i Chiara Pero. "3D Face". W Encyclopedia of Cryptography, Security and Privacy, 1–5. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1501-1.
Pełny tekst źródłaSusilo, Willy, Yang-Wai Chow i Hua-Yu Zhou. "STE3D-CAP: Stereoscopic 3D CAPTCHA". W Cryptology and Network Security, 221–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17619-7_17.
Pełny tekst źródłaXiang, Xuyu, Qiang Liu, Jiaohua Qin i Yun Tan. "3D Coverless Image Steganography Scheme Based on 3D Slice Technology". W Advances in Artificial Intelligence and Security, 291–300. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78621-2_23.
Pełny tekst źródłaSurman, Phil, Ian Sexton, Klaus Hopf, Richard Bates i Wing Kai Lee. "Head Tracked 3D Displays". W Multimedia Content Representation, Classification and Security, 769–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11848035_101.
Pełny tekst źródłaSong, Hwanjong, Ukil Yang i Kwanghoon Sohn. "3D Face Recognition under Pose Varying Environments". W Information Security Applications, 333–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24591-9_25.
Pełny tekst źródłaNakahara, Jorge. "3D: A Three-Dimensional Block Cipher". W Cryptology and Network Security, 252–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89641-8_18.
Pełny tekst źródłaWang, Lei, Yu Sasaki, Kazuo Sakiyama i Kazuo Ohta. "Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function". W Advances in Information and Computer Security, 170–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34117-5_11.
Pełny tekst źródłaStreszczenia konferencji na temat "3D security"
Parker, Grant, Eric MacDonald, Theo Zinner i Mark Yampolskiy. "3D-Mold'ed In-Security". W ASIA CCS '22: ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3494107.3522776.
Pełny tekst źródłaZhu, X., S. Miller, M. Kwan i I. C. Smith. "A high resolution 3D laser camera for 3D object digitization". W Defense and Security, redaktor Gary W. Kamerman. SPIE, 2005. http://dx.doi.org/10.1117/12.602904.
Pełny tekst źródłaHaefner, David P., Bradley L. Preece, Joshua M. Doe i Stephen D. Burks. "Spatially resolved 3D noise". W SPIE Defense + Security, redaktorzy Gerald C. Holst i Keith A. Krapels. SPIE, 2016. http://dx.doi.org/10.1117/12.2222905.
Pełny tekst źródłaEdgar, Matthew P., Baoqing Sun, Richard Bowman, Stephen S. Welsh i Miles J. Padgett. "3D computational ghost imaging". W SPIE Security + Defence, redaktorzy Keith L. Lewis, Richard C. Hollins, Thomas J. Merlet, Mark T. Gruneisen, Miloslav Dusek, John G. Rarity i Edward M. Carapezza. SPIE, 2013. http://dx.doi.org/10.1117/12.2032739.
Pełny tekst źródłaStern, Jonathan M., i Volkan H. Ozguz. "3D system architectures". W Defense and Security Symposium, redaktorzy Ravindra A. Athale i John C. Zolper. SPIE, 2006. http://dx.doi.org/10.1117/12.667381.
Pełny tekst źródłaKawakita, Masahiro, Sabri Gurbuz, Shoichiro Iwasawa, Roberto Lopez-Gulliver, Sumio Yano, Hiroshi Ando i Naomi Inoue. "3D video capturing for multiprojection type 3D display". W SPIE Defense, Security, and Sensing, redaktorzy Bahram Javidi i Jung-Young Son. SPIE, 2011. http://dx.doi.org/10.1117/12.887135.
Pełny tekst źródłaGeng, Jason, Ping Zhuang, Patrick May, Steven Yi i David Tunnell. "3D FaceCam: a fast and accurate 3D facial imaging device for biometrics applications". W Defense and Security, redaktorzy Anil K. Jain i Nalini K. Ratha. SPIE, 2004. http://dx.doi.org/10.1117/12.542208.
Pełny tekst źródłaStraub, Jeremy. "Identifying positioning-based attacks against 3D printed objects and the 3D printing process". W SPIE Defense + Security, redaktor Mohammad S. Alam. SPIE, 2017. http://dx.doi.org/10.1117/12.2264671.
Pełny tekst źródłaBock, Robert. "Low-cost 3D security camera". W Autonomous Systems: Sensors, Vehicles, Security and the Internet of Everything, redaktorzy Michael C. Dudzik i Jennifer C. Ricklin. SPIE, 2018. http://dx.doi.org/10.1117/12.2305455.
Pełny tekst źródłaKnight, Chad, Jake Gunther i Todd Moon. "Model-based 3D SAR reconstruction". W SPIE Defense + Security, redaktorzy Edmund Zelnio i Frederick D. Garber. SPIE, 2014. http://dx.doi.org/10.1117/12.2050832.
Pełny tekst źródłaRaporty organizacyjne na temat "3D security"
Nielsen, Roy S. CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan. Office of Scientific and Technical Information (OSTI), marzec 2015. http://dx.doi.org/10.2172/1171665.
Pełny tekst źródłaBirch, Gabriel Carisle, Amber Lynn Dagel, Brian A. Kast i Collin S. Smith. 3D Imaging with Structured Illumination for Advanced Security Applications. Office of Scientific and Technical Information (OSTI), wrzesień 2015. http://dx.doi.org/10.2172/1221516.
Pełny tekst źródłaWarner, David K., Brian Scott Dickens, Donovan J. Heimer i Ryan Knudsen. Interactive 3D Models and Simulations for Nuclear Security Education, Training, and Analysis. Office of Scientific and Technical Information (OSTI), listopad 2017. http://dx.doi.org/10.2172/1407852.
Pełny tekst źródłaRuby, Jeffrey, Richard Massaro, John Anderson i Robert Fischer. Three-dimensional geospatial product generation from tactical sources, co-registration assessment, and considerations. Engineer Research and Development Center (U.S.), luty 2023. http://dx.doi.org/10.21079/11681/46442.
Pełny tekst źródłaStrutynska, Oksana V., Grygoriy M. Torbin, Mariia A. Umryk i Roman M. Vernydub. Digitalization of the educational process for the training of the pre-service teachers. [б. в.], czerwiec 2021. http://dx.doi.org/10.31812/123456789/4437.
Pełny tekst źródła