Security Analysis based on Differential Entropy in 3D Model Hashing
Vol. 35, No. 12, pp. 995-1003, Dec. 2010
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
S. Lee and K. Kwon, "Security Analysis based on Differential Entropy in 3D Model Hashing," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 12, pp. 995-1003, 2010. DOI: .
[ACM Style]
Suk-Hwan Lee and Ki-Ryong Kwon. 2010. Security Analysis based on Differential Entropy in 3D Model Hashing. The Journal of Korean Institute of Communications and Information Sciences, 35, 12, (2010), 995-1003. DOI: .
[KICS Style]
Suk-Hwan Lee and Ki-Ryong Kwon, "Security Analysis based on Differential Entropy in 3D Model Hashing," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 12, pp. 995-1003, 12. 2010.