Статті в журналах з теми "3D security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "3D security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Lizée, Pierre P. "Human Security in Vietnam, Laos, and Cambodia." Contemporary Southeast Asia 24, no. 3 (December 2002): 509–27. http://dx.doi.org/10.1355/cs24-3d.
Повний текст джерелаJansen, David. "Relations among Security and Law Enforcement Institutions in Indonesia." Contemporary Southeast Asia 30, no. 3 (December 2008): 429–54. http://dx.doi.org/10.1355/cs30-3d.
Повний текст джерелаRaval, Dhatri, and Abhilash Shukla. "Security using 3D Password." International Journal of Computer Applications 120, no. 7 (June 18, 2015): 36–38. http://dx.doi.org/10.5120/21242-4024.
Повний текст джерелаGabriëlse, Robbert. "A 3D Approach to Security and Development." Connections: The Quarterly Journal 06, no. 2 (2007): 67–74. http://dx.doi.org/10.11610/connections.06.2.02.
Повний текст джерелаMartín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.
Повний текст джерелаMayer, Frederik, Stefan Richter, Philipp Hübner, Toufic Jabbour, and Martin Wegener. "3D Fluorescence-Based Security Features by 3D Laser Lithography." Advanced Materials Technologies 2, no. 11 (September 21, 2017): 1700212. http://dx.doi.org/10.1002/admt.201700212.
Повний текст джерелаGomes de Almeida, Franklin Epiphanio. "3D PRINTING AND NEW SECURITY THREATS." Revista do Instituto Brasileiro de Segurança Pública (RIBSP) 3, no. 7 (September 2, 2020): 197–210. http://dx.doi.org/10.36776/ribsp.v3i7.92.
Повний текст джерелаKirkpatrick, Keith. "3D sensors provide security, better games." Communications of the ACM 61, no. 6 (May 23, 2018): 15–17. http://dx.doi.org/10.1145/3204449.
Повний текст джерелаZakaria, Abdul Alif, Azni Haslizan Ab Halim, Farida Ridzuan, Nur Hafiza Zakaria, and Maslina Daud. "LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application." Symmetry 14, no. 10 (September 30, 2022): 2042. http://dx.doi.org/10.3390/sym14102042.
Повний текст джерелаKaur, Veerpal, Devershi Pallavi Bhatt, Pradeep Kumar Tiwari, and Sumegh Tharewal. "Blockchain technology combined with the CNN and Hashing algorithms enabled the secure storage of 3D biometric face and ear data." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 729–38. http://dx.doi.org/10.47974/jdmsc-1745.
Повний текст джерелаKerboua, Adlen, and Mohamed Batouche. "3D Skeleton Action Recognition for Security Improvement." International Journal of Intelligent Systems and Applications 11, no. 3 (March 8, 2019): 42–52. http://dx.doi.org/10.5815/ijisa.2019.03.05.
Повний текст джерелаLi Yu, L. Harrison, Aidong Lu, Zhiwei Li, and Weichao Wang. "3D Digital Legos for Teaching Security Protocols." IEEE Transactions on Learning Technologies 4, no. 2 (April 2011): 125–37. http://dx.doi.org/10.1109/tlt.2010.19.
Повний текст джерелаXie, Yang, Chongxi Bao, Caleb Serafy, Tiantao Lu, Ankur Srivastava, and Mark Tehranipoor. "Security and Vulnerability Implications of 3D ICs." IEEE Transactions on Multi-Scale Computing Systems 2, no. 2 (April 1, 2016): 108–22. http://dx.doi.org/10.1109/tmscs.2016.2550460.
Повний текст джерелаKoch, D. B. "3D visualization to support airport security operations." IEEE Aerospace and Electronic Systems Magazine 19, no. 6 (June 2004): 23–28. http://dx.doi.org/10.1109/maes.2004.1308826.
Повний текст джерелаBhatnagar, Gaurav, Jonathan Wu, and Balasubramanian Raman. "A robust security framework for 3D images." Journal of Visualization 14, no. 1 (December 9, 2010): 85–93. http://dx.doi.org/10.1007/s12650-010-0067-5.
Повний текст джерелаYang, Chengshuai, Yuyang Ding, Jinyang Liang, Fengyan Cao, Dalong Qi, Tianqing Jia, Zhenrong Sun, et al. "Compressed 3D Image Information and Communication Security." Advanced Quantum Technologies 1, no. 2 (June 22, 2018): 1800034. http://dx.doi.org/10.1002/qute.201800034.
Повний текст джерелаZeltmann, Steven Eric, Nikhil Gupta, Nektarios Georgios Tsoutsos, Michail Maniatakos, Jeyavijayan Rajendran, and Ramesh Karri. "Manufacturing and Security Challenges in 3D Printing." JOM 68, no. 7 (May 11, 2016): 1872–81. http://dx.doi.org/10.1007/s11837-016-1937-7.
Повний текст джерелаAli, Nashwan Alsalam, Abdul Monem S. Rahma, and Shaimaa H. Shaker. "Multi-level encryption for 3D mesh model based on 3D Lorenz chaotic map and random number generator." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 6 (December 1, 2022): 6486. http://dx.doi.org/10.11591/ijece.v12i6.pp6486-6495.
Повний текст джерелаNikam, Nilima D., and Amol P. Pande. "Two Way Authentication System 3D Password-3 Levels of Security." International Journal of Scientific Research 3, no. 1 (June 1, 2012): 154–57. http://dx.doi.org/10.15373/22778179/jan2014/50.
Повний текст джерелаФиляк, Петр Юрьевич, Денис Алексеевич Пажинцев, Илья Алексеевич Тырин, Александр Григорьевич Остапенко, and Юрий Юрьевич Громов. "3D PRINTERS - REALITY AND FUTURE. ASPECTS OF INFORMATION SECURITY." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 4(-) (December 25, 2020): 525–34. http://dx.doi.org/10.36622/vstu.2020.23.4.005.
Повний текст джерелаLiu, Yiqun, Xiaorui Wang, Jianqi Zhang, Minqing Zhang, Peng Luo, and Xu An Wang. "An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem." International Journal of Technology and Human Interaction 12, no. 2 (April 2016): 1–21. http://dx.doi.org/10.4018/ijthi.2016040101.
Повний текст джерелаSun, Ning, Sai Tang, Ju Zhang, Jiaxin Wu, and Hongwei Wang. "Food Security: 3D Dynamic Display and Early Warning Platform Construction and Security Strategy." International Journal of Environmental Research and Public Health 19, no. 18 (September 6, 2022): 11169. http://dx.doi.org/10.3390/ijerph191811169.
Повний текст джерелаPark, Young-Tae, and Dae-Ho Lee. "3D Vision-based Security Monitoring for Railroad Stations." Journal of the Optical Society of Korea 14, no. 4 (December 25, 2010): 451–57. http://dx.doi.org/10.3807/josk.2010.14.4.451.
Повний текст джерелаNguyen, Vu Duc, Yang-Wai Chow, and Willy Susilo. "On the security of text-based 3D CAPTCHAs." Computers & Security 45 (September 2014): 84–99. http://dx.doi.org/10.1016/j.cose.2014.05.004.
Повний текст джерелаLiu, Yuntao, Daniel Xing, Isaac McDaniel, Olsan Ozbay, Abir Akib, Mumtahina Islam Sukanya, Sanjay Rekhi, and Ankur Srivastava. "Security Advantages and Challenges of 3D Heterogeneous Integration." Computer 57, no. 3 (March 2024): 107–12. http://dx.doi.org/10.1109/mc.2023.3340798.
Повний текст джерелаДурлевич, С. Р. "Computer synthesis of diffractive optical elements for forming 3D images." Numerical Methods and Programming (Vychislitel'nye Metody i Programmirovanie), no. 1 (February 28, 2017): 11–19. http://dx.doi.org/10.26089/nummet.v18r102.
Повний текст джерелаLiu, Si Ping. "Research on Cloud Computing Strategy Based on Security Model." Applied Mechanics and Materials 644-650 (September 2014): 1835–39. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.1835.
Повний текст джерелаHiguchi, Kazutoshi, Mitsuru Kaise, Hiroto Noda, Go Ikeda, Teppei Akimoto, Hiroshi Yamawaki, Osamu Goto, Nobue Ueki, Seiji Futagami, and Katsuhiko Iwakiri. "Usefulness of 3-Dimensional Flexible Endoscopy in Esophageal Endoscopic Submucosal Dissection in an Ex Vivo Animal Model." Gastroenterology Research and Practice 2019 (November 3, 2019): 1–5. http://dx.doi.org/10.1155/2019/4051956.
Повний текст джерелаLuo, Ting, Liwen Zuo, Gangyi Jiang, Wei Gao, Haiyong Xu, and Qiuping Jiang. "Security of MVD-based 3D video in 3D-HEVC using data hiding and encryption." Journal of Real-Time Image Processing 17, no. 4 (September 5, 2018): 773–85. http://dx.doi.org/10.1007/s11554-018-0817-5.
Повний текст джерелаChen, Jin Mu, Chun Lin Zhang, Ren De Wang, Xian Feng Lu, Wei Wang, Xun Feng Wang, and Xiao Jun Shen. "Preliminary Application of Terrestrial 3D LiDar in Corridor Defects Detection of Overhead Transmission Lines." Advanced Materials Research 718-720 (July 2013): 918–22. http://dx.doi.org/10.4028/www.scientific.net/amr.718-720.918.
Повний текст джерелаFelsenstein, Christoph, Knud Benedict, and Michael Baldauf. "Maritime Safety and Security Challenges – 3D Simulation Based Training." TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation 7, no. 3 (2013): 327–36. http://dx.doi.org/10.12716/1001.07.03.02.
Повний текст джерелаKim, Donghyun, and Seoksoo Kim. "Design of 3D Contents Augmented Method using XML Security." Journal of Security Engineering 14, no. 2 (April 30, 2017): 181–88. http://dx.doi.org/10.14257/jse.2017.04.09.
Повний текст джерелаZhao, Wei, Lingling Wu, Baogang Li, Hui Bao, and Chunxiu Zhang. "Physical Layer Security Performance Based on 3D Heterogeneous Network." Wireless Communications and Mobile Computing 2018 (2018): 1–7. http://dx.doi.org/10.1155/2018/2753614.
Повний текст джерелаSonkar S.K, Prof, and Author Dr.Ghungrad.S.B. "Minimum Space and Huge Security in 3D Password Scheme." International Journal of Computer Applications 29, no. 4 (September 29, 2011): 35–40. http://dx.doi.org/10.5120/3552-4872.
Повний текст джерелаZhang, Yuchong, Xiaoxia Le, Yukun Jian, Wei Lu, Jiawei Zhang, and Tao Chen. "3D Fluorescent Hydrogel Origami for Multistage Data Security Protection." Advanced Functional Materials 29, no. 46 (September 6, 2019): 1905514. http://dx.doi.org/10.1002/adfm.201905514.
Повний текст джерелаYan, Wenhao, Zijing Jiang, Xin Huang, and Qun Ding. "A Three-Dimensional Infinite Collapse Map with Image Encryption." Entropy 23, no. 9 (September 17, 2021): 1221. http://dx.doi.org/10.3390/e23091221.
Повний текст джерелаSalih, Adnan Ibrahem, Ashwaq Mahmood Alabaichi, and Ammar Yaseen Tuama. "Enhancing advance encryption standard security based on dual dynamic XOR table and MixColumns transformation." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (September 1, 2020): 1574. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1574-1581.
Повний текст джерелаMiroslav, Marcanik, Sustek Michal, and Jasek Roman. "3D sensors in critical infrastructure." MATEC Web of Conferences 210 (2018): 04034. http://dx.doi.org/10.1051/matecconf/201821004034.
Повний текст джерелаWang, Yajing, Yaodong Yang, Shuaipeng Suo, Mingyuan Wang, and Weifeng Rao. "Using Blockchain to Protect 3D Printing from Unauthorized Model Tampering." Applied Sciences 12, no. 15 (August 8, 2022): 7947. http://dx.doi.org/10.3390/app12157947.
Повний текст джерелаJohn, Siju, and S. N. Kumar. "6D Hyperchaotic Encryption Model for Ensuring Security to 3D Printed Models and Medical Images." Journal of Image and Graphics 12, no. 2 (2024): 117–26. http://dx.doi.org/10.18178/joig.12.2.117-126.
Повний текст джерелаLiu, Hongjun, Abdurahman Kadir, and Chengbo Xu. "Color Image Encryption with Cipher Feedback and Coupling Chaotic Map." International Journal of Bifurcation and Chaos 30, no. 12 (September 30, 2020): 2050173. http://dx.doi.org/10.1142/s0218127420501734.
Повний текст джерелаCalafate, Carlos T., and Mauro Tropea. "Unmanned Aerial Vehicles—Platforms, Applications, Security and Services." Electronics 9, no. 6 (June 11, 2020): 975. http://dx.doi.org/10.3390/electronics9060975.
Повний текст джерелаZhang, Jing, Aimin Yan, and Hongbo Zhang. "Asymmetric Encryption of Invisible Structured Light 3D Imaging." Applied Sciences 12, no. 7 (March 31, 2022): 3563. http://dx.doi.org/10.3390/app12073563.
Повний текст джерелаCultice, Tyler, Joseph Clark, Wu Yang, and Himanshu Thapliyal. "A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World." Sensors 23, no. 24 (December 17, 2023): 9886. http://dx.doi.org/10.3390/s23249886.
Повний текст джерелаZhou, Ye, Junjun Yu, Liuyan Pan, Yi Wang, and Qunsheng Cao. "3D MIMO imaging architecture for walk through personnel security screening." IET Microwaves, Antennas & Propagation 12, no. 14 (September 17, 2018): 2206–12. http://dx.doi.org/10.1049/iet-map.2018.5299.
Повний текст джерелаWalther, Gerald. "Printing Insecurity? The Security Implications of 3D-Printing of Weapons." Science and Engineering Ethics 21, no. 6 (December 18, 2014): 1435–45. http://dx.doi.org/10.1007/s11948-014-9617-x.
Повний текст джерелаMerlin, Livingston L. M., Livingston L. G. X. Agnel, and Livingston L. M. Jenila. "MULTIMEDIA SECURITY SPOOFING OF DIGITAL IMAGE FORENSICS -3D FACE MASK." International Journal of Scientific and Engineering Research 7, no. 5 (May 25, 2016): 320–28. http://dx.doi.org/10.14299/ijser.2016.05.001.
Повний текст джерелаKhan, Aslam A., Chengji Xi, and Navid Asadizanjani. "Physical Security Roadmap for Heterogeneous Integration Technology." EDFA Technical Articles 24, no. 2 (May 1, 2022): 24–32. http://dx.doi.org/10.31399/asm.edfa.2022-2.p024.
Повний текст джерелаLiu, Pai, Shihua Zhou, and Wei Qi Yan. "A 3D Cuboid Image Encryption Algorithm Based on Controlled Alternate Quantum Walk of Message Coding." Mathematics 10, no. 23 (November 24, 2022): 4441. http://dx.doi.org/10.3390/math10234441.
Повний текст джерелаRahayu, Rivi Tri, Abduh Riski, and Ahmad Kamsyakawuni. "PENYANDIAN CITRA MENGGUNAKAN ALGORITMA 4D PLAYFAIR CIPHER DENGAN PEMBANGKITAN KUNCI MODIFIKASI LINEAR FEEDBACK SHIFT REGISTER." Majalah Ilmiah Matematika dan Statistika 19, no. 1 (March 1, 2019): 17. http://dx.doi.org/10.19184/mims.v19i1.17261.
Повний текст джерела