Hiding data and code security for application hosting infrastructure

被引:0
|
作者
Lin, P [1 ]
Candan, KS [1 ]
Bazzi, R [1 ]
Liu, ZC [1 ]
机构
[1] Arizona State Univ, Dept Comp Sci & Engn, Tempe, AZ 85287 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
引用
收藏
页码:388 / 388
页数:1
相关论文
共 50 条
  • [1] Beautified QR Code with Security Based on Data Hiding
    Cai, Huili
    Liu, Xiaofeng
    Yan, Bin
    [J]. ADVANCES IN COMPUTATIONAL INTELLIGENCE SYSTEMS (UKCI 2019), 2020, 1043 : 423 - 432
  • [2] Data hosting infrastructure for primary biodiversity data
    Goddard, Anthony
    Wilson, Nathan
    Cryer, Phil
    Yamashita, Grant
    [J]. BMC BIOINFORMATICS, 2011, 12 : S5
  • [3] Data hosting infrastructure for primary biodiversity data
    Anthony Goddard
    Nathan Wilson
    Phil Cryer
    Grant Yamashita
    [J]. BMC Bioinformatics, 12
  • [4] Security controls in infrastructure as code
    Almuairfi, Sadiq
    Alenezi, Mamdouh
    [J]. Computer Fraud and Security, 2020, 2020 (10): : 13 - 19
  • [5] Data security using data hiding
    Moon, S. K.
    Kawitkar, R. S.
    [J]. ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 247 - +
  • [6] Security of data hiding technologies
    Voloshynovskiy, S
    Pun, T
    Fridrich, J
    Pérez-Gonzálcz, F
    Memon, N
    [J]. SIGNAL PROCESSING, 2003, 83 (10) : 2065 - 2067
  • [7] Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole
    Wang, Yuan-Gen
    Zhu, Guopu
    Li, Jin
    Conti, Mauro
    Huang, Jiwu
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (01) : 76 - 87
  • [8] GitBull: Source Code Hosting Web Application
    Qusef, Abdallah
    Albadarneh, Israa
    Albadarneh, Aalaa
    [J]. 2015 IEEE JORDAN CONFERENCE ON APPLIED ELECTRICAL ENGINEERING AND COMPUTING TECHNOLOGIES (AEECT), 2015,
  • [9] A Desktop Application of QR Code for Data Security and Authentication
    Mittra, Partiksha
    Rakesh, Nitin
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 62 - 66
  • [10] Fundamentals of data hiding security and their application to spread-spectrum analysis
    Comesaña, P
    Pérez-Freire, L
    Pérez-González, F
    [J]. INFORMATION HIDING, 2005, 3727 : 146 - 160