ElSayed et al., 2023 - Google Patents
Information embedding for secure manufacturing: Challenges and research opportunitiesElSayed et al., 2023
- Document ID
- 1142670244157704974
- Author
- ElSayed K
- Dachowicz A
- Atallah M
- Panchal J
- Publication year
- Publication venue
- Journal of Computing and Information Science in Engineering
External Links
Snippet
The digitization of manufacturing has transformed the product realization process across many industries, from aerospace and automotive to medicine and healthcare. While this progress has accelerated product development cycles and enabled designers to create …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sengupta et al. | Exploring low cost optimal watermark for reusable IP cores during high level synthesis | |
Pan et al. | Taxonomies for reasoning about cyber-physical attacks in IoT-based manufacturing systems | |
Shi et al. | A Blockchain-based G-code protection approach for cyber-physical security in additive manufacturing | |
Situ et al. | Cryptanalysis of optical security systems with significant output images | |
Girdhar et al. | Comprehensive survey of 3D image steganography techniques | |
Lou et al. | Construction information authentication and integrity using blockchain-oriented watermarking techniques | |
Wang et al. | Reversible fragile watermarking for locating tampered blocks in 2D vector maps | |
ElSayed et al. | Information embedding for secure manufacturing: Challenges and research opportunities | |
Chaduvula et al. | Security in cyber-enabled design and manufacturing: A survey | |
Chen et al. | Obfuscation of embedded codes in additive manufactured components for product authentication | |
Cai et al. | Parametric and adaptive encryption of feature-based computer-aided design models for cloud-based collaboration | |
Che et al. | Analysis of entropy in a hardware-embedded delay puf | |
Alasad et al. | E2LEMI: energy-efficient logic encryption using multiplexer insertion | |
Fullington et al. | Design de-identification of thermal history for collaborative process-defect modeling of directed energy deposition processes | |
Shi et al. | Sensor data protection through integration of blockchain and camouflaged encryption in cyber-physical manufacturing systems | |
Nyako et al. | Building trust in microelectronics: a comprehensive review of current techniques and adoption challenges | |
Liang et al. | Hausdorff distance model-based identity authentication for IP circuits in service-centric internet-of-things environment | |
Fei et al. | Design a new image encryption algorithm based on a 2D-ASCC map | |
Yan et al. | Security analysis of secret image sharing | |
Li et al. | Reversible data hiding for encrypted 3D model based on prediction error expansion | |
CN103886540B (en) | Ellipse figure characteristic digital fingerprint embedding and detection method | |
Chakraborty et al. | Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures | |
Apau et al. | Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review | |
ElSayed et al. | Information Embedding in Additively Manufactured Parts Through Printing Speed Control | |
Islam et al. | A Survey on Limitation, Security and Privacy Issues on Additive Manufacturing |