Artigos de revistas sobre o tema "Fingerprinting codes"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Fingerprinting codes".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Löfvenberg, J. "Binary Fingerprinting Codes". Designs, Codes and Cryptography 36, n.º 1 (julho de 2005): 69–81. http://dx.doi.org/10.1007/s10623-003-1163-5.
Texto completo da fonteZHU, Yan. "Convolutional Fingerprinting Information Codes for Collusion Security". Journal of Software 17, n.º 7 (2006): 1617. http://dx.doi.org/10.1360/jos171617.
Texto completo da fonteNuida, Koji, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa e Hideki Imai. "An improvement of discrete Tardos fingerprinting codes". Designs, Codes and Cryptography 52, n.º 3 (2 de abril de 2009): 339–62. http://dx.doi.org/10.1007/s10623-009-9285-z.
Texto completo da fonteFodor, Gabor, Peter Schelkens e Ann Dooms. "Fingerprinting Codes Under the Weak Marking Assumption". IEEE Transactions on Information Forensics and Security 13, n.º 6 (junho de 2018): 1495–508. http://dx.doi.org/10.1109/tifs.2017.2779112.
Texto completo da fonteMurala, Kranthi Kumar, Dr M. Kamaraju e Dr K. Ramanjaneyulu. "Digital Fingerprinting In Encrypted Domain". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, n.º 1 (15 de dezembro de 2013): 3138–46. http://dx.doi.org/10.24297/ijct.v12i1.3360.
Texto completo da fonteYAGI, Hideki, Toshiyasu MATSUSHIMA e Shigeichi HIRASAWA. "Fingerprinting Codes for Multimedia Data against Averaging Attack". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, n.º 1 (2009): 207–16. http://dx.doi.org/10.1587/transfun.e92.a.207.
Texto completo da fonteWu, Ja-Ling. "Concatenated construction of traceability codes for multimedia fingerprinting". Optical Engineering 46, n.º 10 (1 de outubro de 2007): 107202. http://dx.doi.org/10.1117/1.2790911.
Texto completo da fonteSkoric, Boris, Stefan Katzenbeisser, Hans Georg Schaathun e Mehmet Utku Celik. "Tardos Fingerprinting Codes in the Combined Digit Model". IEEE Transactions on Information Forensics and Security 6, n.º 3 (setembro de 2011): 906–19. http://dx.doi.org/10.1109/tifs.2011.2116783.
Texto completo da fonteGao, Fei, e Gennian Ge. "New Bounds on Separable Codes for Multimedia Fingerprinting". IEEE Transactions on Information Theory 60, n.º 9 (setembro de 2014): 5257–62. http://dx.doi.org/10.1109/tit.2014.2331989.
Texto completo da fonteCotrina-Navau, Josep, e Marcel Fernandez. "A Family of Asymptotically Good Binary Fingerprinting Codes". IEEE Transactions on Information Theory 56, n.º 10 (outubro de 2010): 5335–43. http://dx.doi.org/10.1109/tit.2010.2059470.
Texto completo da fonteŠkorić, Boris, Stefan Katzenbeisser e Mehmet U. Celik. "Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes". Designs, Codes and Cryptography 46, n.º 2 (1 de novembro de 2007): 137–66. http://dx.doi.org/10.1007/s10623-007-9142-x.
Texto completo da fonteSCHAATHUN, H. G., e M. FERNANDEZ. "Soft Decision Decoding of Boneh-Shaw Fingerprinting Codes". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, n.º 10 (1 de outubro de 2006): 2603–8. http://dx.doi.org/10.1093/ietfec/e89-a.10.2603.
Texto completo da fonteSchäfer, Marcel, Waldemar Berchtold, Teetje Stark, Nils Reimers e Martin Steinebach. "A Novel Attack Model for Collusion Secure Fingerprinting Codes". Electronic Imaging 2016, n.º 8 (14 de fevereiro de 2016): 1–11. http://dx.doi.org/10.2352/issn.2470-1173.2016.8.mwsf-085.
Texto completo da fonteBarg, A., G. R. Blakley e G. A. Kabatiansky. "Digital fingerprinting codes: problem statements, constructions, identification of traitors". IEEE Transactions on Information Theory 49, n.º 4 (abril de 2003): 852–65. http://dx.doi.org/10.1109/tit.2003.809570.
Texto completo da fonteBun, Mark, Jonathan Ullman e Salil Vadhan. "Fingerprinting Codes and the Price of Approximate Differential Privacy". SIAM Journal on Computing 47, n.º 5 (janeiro de 2018): 1888–938. http://dx.doi.org/10.1137/15m1033587.
Texto completo da fonteKiyavash, N., e P. Moulin. "Performance of Orthogonal Fingerprinting Codes Under Worst-Case Noise". IEEE Transactions on Information Forensics and Security 4, n.º 3 (setembro de 2009): 293–301. http://dx.doi.org/10.1109/tifs.2009.2026462.
Texto completo da fonteMeerwald, Peter, e Teddy Furon. "Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes". IEEE Transactions on Information Forensics and Security 7, n.º 4 (agosto de 2012): 1168–80. http://dx.doi.org/10.1109/tifs.2012.2195655.
Texto completo da fonteSchaathun, Hans Georg. "On error-correcting fingerprinting codes for use with watermarking". Multimedia Systems 13, n.º 5-6 (19 de setembro de 2007): 331–44. http://dx.doi.org/10.1007/s00530-007-0096-7.
Texto completo da fonteCheng, Minquan, Hung-Lin Fu, Jing Jiang, Yuan-Hsun Lo e Ying Miao. "Codes with the identifiable parent property for multimedia fingerprinting". Designs, Codes and Cryptography 83, n.º 1 (7 de abril de 2016): 71–82. http://dx.doi.org/10.1007/s10623-016-0203-x.
Texto completo da fonteBassey, Joshua, Xiangfang Li e Lijun Qian. "Device Authentication Codes based on RF Fingerprinting using Deep Learning". ICST Transactions on Security and Safety 8, n.º 29 (30 de novembro de 2021): 172305. http://dx.doi.org/10.4108/eai.30-11-2021.172305.
Texto completo da fonteBui, Thach V., Binh Q. Nguyen, Thuc D. Nguyen, Noboru Sonehara e Isao Echizen. "Robust fingerprinting codes for database using non-adaptive group testing". International Journal of Big Data Intelligence 2, n.º 2 (2015): 81. http://dx.doi.org/10.1504/ijbdi.2015.069095.
Texto completo da fonteFan, Jinping, Yujie Gu, Masahiro Hachimori e Ying Miao. "Signature Codes for Weighted Binary Adder Channel and Multimedia Fingerprinting". IEEE Transactions on Information Theory 67, n.º 1 (janeiro de 2021): 200–216. http://dx.doi.org/10.1109/tit.2020.3033445.
Texto completo da fonteCheng, Minquan, e Ying Miao. "On Anti-Collusion Codes and Detection Algorithms for Multimedia Fingerprinting". IEEE Transactions on Information Theory 57, n.º 7 (julho de 2011): 4843–51. http://dx.doi.org/10.1109/tit.2011.2146130.
Texto completo da fonteScott, A. J., J. Walgate e B. C. Sanders. "Optimal fingerprinting strategies with one-sided error". Quantum Information and Computation 7, n.º 3 (março de 2007): 243–64. http://dx.doi.org/10.26421/qic7.3-5.
Texto completo da fonteFernandez, Marcel, Josep Cotrina‐Navau e Miguel Soriano. "A class of non‐linear asymptotic fingerprinting codes with ε‐error". Online Information Review 31, n.º 1 (27 de fevereiro de 2007): 22–37. http://dx.doi.org/10.1108/14684520710731010.
Texto completo da fonteSebé, F., e J. Domingo-Ferrer. "Scattering codes to implement short 3-secure fingerprinting for copyright protection". Electronics Letters 38, n.º 17 (2002): 958. http://dx.doi.org/10.1049/el:20020648.
Texto completo da fonteJourdas, J. F., e P. Moulin. "High-Rate Random-Like Spherical Fingerprinting Codes With Linear Decoding Complexity". IEEE Transactions on Information Forensics and Security 4, n.º 4 (dezembro de 2009): 768–80. http://dx.doi.org/10.1109/tifs.2009.2034188.
Texto completo da fonteMoreira, José, Marcel Fernández e Grigory Kabatiansky. "Constructions of almost secure frameproof codes with applications to fingerprinting schemes". Designs, Codes and Cryptography 86, n.º 4 (20 de abril de 2017): 785–802. http://dx.doi.org/10.1007/s10623-017-0359-z.
Texto completo da fonteJiang, Yuzhou, Emre Yilmaz e Erman Ayday. "Robust Fingerprint of Privacy-Preserving Location Trajectories". Proceedings on Privacy Enhancing Technologies 2023, n.º 4 (outubro de 2023): 5–20. http://dx.doi.org/10.56553/popets-2023-0095.
Texto completo da fonteRochanakul, Penying. "New Bounds on 2-Frameproof Codes of Length 4". International Journal of Mathematics and Mathematical Sciences 2020 (23 de janeiro de 2020): 1–5. http://dx.doi.org/10.1155/2020/4879108.
Texto completo da fonteKURIBAYASHI, Minoru, e Nobuo FUNABIKI. "Universal Scoring Function Based on Bias Equalizer for Bias-Based Fingerprinting Codes". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A, n.º 1 (2018): 119–28. http://dx.doi.org/10.1587/transfun.e101.a.119.
Texto completo da fonteEgorova, Elena, Marcel Fernandez, Grigory Kabatiansky e Moon Ho Lee. "Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing". Designs, Codes and Cryptography 87, n.º 2-3 (21 de setembro de 2018): 455–62. http://dx.doi.org/10.1007/s10623-018-0551-9.
Texto completo da fonteHOU, Shuhui, Tetsutaro UEHARA, Takashi SATOH, Yoshitaka MORIMURA e Michihiko MINOH. "Fingerprinting Codes for Internet-Based Live Pay-TV System Using Balanced Incomplete Block Designs". IEICE Transactions on Information and Systems E92-D, n.º 5 (2009): 876–87. http://dx.doi.org/10.1587/transinf.e92.d.876.
Texto completo da fonteKorzhik, Valery, Guilermo Morales-Luna, Alexander Kochkarev e Dmitriy Flaxman. "Concatenated digital watermarking system robust to different removal attacks". Computer Science and Information Systems 11, n.º 4 (2014): 1581–94. http://dx.doi.org/10.2298/csis131218072k.
Texto completo da fonteCrawford, Brian H., AKM A. Hussain e Nathan M. Jideama. "Evidence of a Genomic Biomarker in Normal Human Epithelial Mammary Cell Line, MCF-10A, That Is Absent in the Human Breast Cancer Cell Line, MCF-7". Journal of Biomedicine and Biotechnology 2006 (2006): 1–5. http://dx.doi.org/10.1155/jbb/2006/43181.
Texto completo da fonteHuser, Vojtech, Nick D. Williams e Craig S. Mayer. "Linking Provider Specialty and Outpatient Diagnoses in Medicare Claims Data: Data Quality Implications". Applied Clinical Informatics 12, n.º 04 (agosto de 2021): 729–36. http://dx.doi.org/10.1055/s-0041-1732404.
Texto completo da fonteEgorova, E. E., M. Fernandez, G. A. Kabatiansky e Y. Miao. "Existence and Construction of Complete Traceability Multimedia Fingerprinting Codes Resistant to Averaging Attack and Adversarial Noise". Problems of Information Transmission 56, n.º 4 (dezembro de 2020): 388–98. http://dx.doi.org/10.1134/s0032946020040080.
Texto completo da fonteZhang, Hui, Pingping Lin, Yanming Liu, Chaohua Huang, Guoqiang Huang, Hongtao Jiang, Liangnian Xu, Muqing Zhang, Zuhu Deng e Xinwang Zhao. "Development of SLAF-Sequence and Multiplex SNaPshot Panels for Population Genetic Diversity Analysis and Construction of DNA Fingerprints for Sugarcane". Genes 13, n.º 8 (19 de agosto de 2022): 1477. http://dx.doi.org/10.3390/genes13081477.
Texto completo da fonteJi, Tianxi, Erman Ayday, Emre Yilmaz e Pan Li. "Privacy-Preserving Fingerprinting Against Collusion and Correlation Threats in Genomic Data". Proceedings on Privacy Enhancing Technologies 2024, n.º 3 (julho de 2024): 659–73. http://dx.doi.org/10.56553/popets-2024-0098.
Texto completo da fonteCai, Yong, Xiwen Li, Mei Li, Xiaojia Chen, Hao Hu, Jingyun Ni e Yitao Wang. "Traceability and Quality Control in Traditional Chinese Medicine: From Chemical Fingerprint to Two-Dimensional Barcode". Evidence-Based Complementary and Alternative Medicine 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/251304.
Texto completo da fonteGrass, Gregor, Angelika Schierhorn, Eduard Sorkau, Helmut Müller, Peter Rücknagel, Dietrich H. Nies e Beate Fricke. "Camelysin Is a Novel Surface Metalloproteinase from Bacillus cereus". Infection and Immunity 72, n.º 1 (janeiro de 2004): 219–28. http://dx.doi.org/10.1128/iai.72.1.219-228.2004.
Texto completo da fonteYu, Yue, Yi Zhang, Liang Chen e Ruizhi Chen. "Intelligent Fusion Structure for Wi-Fi/BLE/QR/MEMS Sensor-Based Indoor Localization". Remote Sensing 15, n.º 5 (22 de fevereiro de 2023): 1202. http://dx.doi.org/10.3390/rs15051202.
Texto completo da fonteSmirnova, Irina G., e Ekaterina V. Alekseeva. "Ensuring the Rights and Legal Interests of the Victim when Checking the Crime Report: A Comparative Legal Analysis of the Criminal Procedure Codes of the Russian Federation and the People’s Republic of China". Ugolovnaya yustitsiya, n.º 17 (2021): 128–33. http://dx.doi.org/10.17223/23088451/17/25.
Texto completo da fonteMgode, G. F., R. S. Machang'u, M. G. Goris, M. Engelbert, S. Sondij e R. A. Hartskeerl. "New Leptospira serovar Sokoine of serogroup Icterohaemorrhagiae from cattle in Tanzania". International Journal of Systematic and Evolutionary Microbiology 56, n.º 3 (1 de março de 2006): 593–97. http://dx.doi.org/10.1099/ijs.0.63278-0.
Texto completo da fonteKoolstra, Kirsten, Peter Börnert, Boudewijn P. F. Lelieveldt, Andrew Webb e Oleh Dzyubachyk. "Stochastic neighbor embedding as a tool for visualizing the encoding capability of magnetic resonance fingerprinting dictionaries". Magnetic Resonance Materials in Physics, Biology and Medicine 35, n.º 2 (23 de outubro de 2021): 223–34. http://dx.doi.org/10.1007/s10334-021-00963-8.
Texto completo da fonteSić, Siniša, Norbert M. Maier e Andreas M. Rizzi. "Quantitative fingerprinting of O-linked glycans released from proteins using isotopic coded labeling with deuterated 1-phenyl-3-methyl-5-pyrazolone". Journal of Chromatography A 1408 (agosto de 2015): 93–100. http://dx.doi.org/10.1016/j.chroma.2015.06.065.
Texto completo da fonteGe, Yuan, Joshua P. Schimel e Patricia A. Holden. "Identification of Soil Bacteria Susceptible to TiO2and ZnO Nanoparticles". Applied and Environmental Microbiology 78, n.º 18 (13 de julho de 2012): 6749–58. http://dx.doi.org/10.1128/aem.00941-12.
Texto completo da fonteMichael, Claudia, e Andreas M. Rizzi. "Quantitative isomer-specific N-glycan fingerprinting using isotope coded labeling and high performance liquid chromatography–electrospray ionization-mass spectrometry with graphitic carbon stationary phase". Journal of Chromatography A 1383 (fevereiro de 2015): 88–95. http://dx.doi.org/10.1016/j.chroma.2015.01.028.
Texto completo da fonteDekio, Itaru, Yuki Sugiura, Susumu Hamada-Tsutsumi, Yoshiyuki Murakami, Hiroto Tamura e Makoto Suematsu. "What Do We See in Spectra?: Assignment of High-Intensity Peaks of Cutibacterium and Staphylococcus Spectra of MALDI-TOF Mass Spectrometry by Interspecies Comparative Proteogenomics". Microorganisms 9, n.º 6 (8 de junho de 2021): 1243. http://dx.doi.org/10.3390/microorganisms9061243.
Texto completo da fonteKhan, MZI, e PK De. "DETERMINATION OF APHRODISIN GENE OF SYRIAN HAMSTER BY MOLECULAR TECHNIQUE". Bangladesh Journal of Veterinary Medicine 8, n.º 2 (12 de julho de 2012): 175–84. http://dx.doi.org/10.3329/bjvm.v8i2.11202.
Texto completo da fonte