Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 209,922,982 papers from all fields of science
Search
Sign In
Create Free Account
3D security
3D security is a framework promoting development, diplomacy, and defense as security strategies. The 3D security framework recognizes that security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Broader (1)
Security engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Low-cost 3D security camera
R. Bock
Defense + Security
2018
Corpus ID: 67448515
R-DEX Systems is developing a low-cost 3D security camera for residential, commercial, and military applications. This innovative…
Expand
2016
2016
3D Point Cloud Encryption Through Chaotic Mapping
Xin Jin
,
Zhaoxing Wu
,
Chenggen Song
,
Chunwei Zhang
,
Xiaodong Li
Pacific Rim Conference on Multimedia
2016
Corpus ID: 42709569
Three dimensional (3D) contents such as 3D point clouds, 3D meshes and 3D surface models are increasingly growing and being…
Expand
2014
2014
Elastic security zones for NoC-based 3D-MPSoCs
Martha Johanna Sepúlveda
,
G. Gogniat
,
Daniel Flórez
,
J. Diguet
,
C. Zeferino
,
M. Strum
International Conference on Electronics, Circuits…
2014
Corpus ID: 572769
3D-MPSoCs integrate cores of several vendors and support different applications on a single die, providing large performance and…
Expand
2013
2013
ARGUS 3D: Security Enhancements through Innovative Radar Technologies
R. Cardinali
,
Enrico Anniballi
,
C. Bongioanni
,
A. Macera
,
F. Colone
,
P. Lombardo
ARES
2013
Corpus ID: 1492395
This electronic document is a "live" template. The various Conventional civil Air Traffic Control (ATC) systems are able to…
Expand
2012
2012
3D Security, 3Dsec: Trustworthy System Security through 3D Integrated Hardware [poster]
T. Sherwood
,
C. Irvine
,
Ted Huffmire
,
T. Levin
,
R. Kastner
,
Jonathan Valamehr
2012
Corpus ID: 109610796
Poster, Wednesday Poster Session, NSF Secure and Trustworthy Cyberspace (SaTC) Principal Investigators Meeting, National Harbor…
Expand
2011
2011
View synthesis of KDEX imagery for 3D security X-ray imaging
O. Abusaeeda
,
Jpo Evans
,
D. Downes
,
J. Chan
International Conferences on Imaging for Crime…
2011
Corpus ID: 132920229
We demonstrate the synthesis of intermediary views within a sequence of X-ray images that exhibit depth from motion or kinetic…
Expand
2011
2011
The applications of conflict resolution theories on Turkey's Kurdish conflict and its peacebuilding work
A. Güralp
2011
Corpus ID: 153248887
2011
2011
Animated depth employing image synthesis for 3D security X-ray imaging
O. Abusaeeda
,
J. P. Evans
,
D. Downes
,
J. Chan
IEEE International Symposium on Signal Processing…
2011
Corpus ID: 14423922
We demonstrate the production of synthetic X-ray images by employing the scale invariant feature transform or SIFT in combination…
Expand
2006
2006
Bitmap based cryptographic access control for restricted views of XML documents
K. Ganesan
,
A.J.M. Jamal
International Conference on Advanced Computing…
2006
Corpus ID: 11751614
With the proliferation of more and more mobile devices for data access, there seems to be a great deal of demand in filtering the…
Expand
2003
2003
MEASURING 3-D SECURE AND 3 D SET AGAINST E-COMMERCE END-USER REQUIREMENTS
Pita Jarupunphol
,
C. Mitchell
,
C. Mitchell
2003
Corpus ID: 15378633
The threat of credit card fraud is arguably the most serious issue of concern to e-commerce participants, including consumers and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE