Academic literature on the topic 'Shard key'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Shard key.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Shard key"
Hao, Jun, Jun Chen, and Qin Chen. "Floating Charge Method Based on Shared Parking." Sustainability 11, no. 1 (December 23, 2018): 72. http://dx.doi.org/10.3390/su11010072.
Full textGórniak, K., T. Szydłak, A. Gaweł, A. Klimek, A. Tomczyk, B. Sulikowski, Z. Olejniczak, J. Motyka, E. M. Serwicka, and K. Bahranowski. "Commercial bentonite from the Kopernica deposit (Tertiary, Slovakia): a petrographic and mineralogical approach." Clay Minerals 51, no. 1 (March 2016): 97–122. http://dx.doi.org/10.1180/claymin.2016.051.1.09.
Full textKrukov, S. A., N. V. Baydakova, and V. M. Shumyacher. "Determining the Volume-size Pore Space Parameters in the Grinding Wheels." Mechanical Engineering and Computer Science, no. 5 (June 21, 2018): 1–8. http://dx.doi.org/10.24108/0518.0001391.
Full textKim, Jeongin, and Namhi Kang. "Secure Configuration Scheme of Pre-shared Key for Lightweight Devices in Internet of Things." Journal of The Institute of Internet, Broadcasting and Communication 15, no. 3 (June 30, 2015): 1–6. http://dx.doi.org/10.7236/jiibc.2015.15.3.1.
Full textNdzi, Ernestine. "Shared parental leave: awareness is key." International Journal of Law and Management 59, no. 6 (November 13, 2017): 1331–36. http://dx.doi.org/10.1108/ijlma-07-2017-0160.
Full textAl-Fandi, Audai. "Symmetric Volatile Shared Key Encryption: A Two-way Communication Shared Key Encryption." Mathematics and Computer Science 2, no. 3 (2017): 27. http://dx.doi.org/10.11648/j.mcs.20170203.11.
Full textBaker, Monya. "Repositories share key research tools." Nature 505, no. 7483 (January 2014): 272. http://dx.doi.org/10.1038/505272a.
Full textB. Melo, Nicholas, and Tetsuyou Watanabe. "Key Posture Extraction from Object Manipulations Experiments." Advanced Engineering Forum 2-3 (December 2011): 308–13. http://dx.doi.org/10.4028/www.scientific.net/aef.2-3.308.
Full textCai, Binbin, Gongde Guo, and Song Lin. "Multi-party quantum key agreement with teleportation." Modern Physics Letters B 31, no. 10 (April 10, 2017): 1750102. http://dx.doi.org/10.1142/s0217984917501020.
Full textShim, Kyungah. "Unknown key-share attack on authenticated multiple-key agreement protocol." Electronics Letters 39, no. 1 (2003): 38. http://dx.doi.org/10.1049/el:20030076.
Full textDissertations / Theses on the topic "Shard key"
Даценко, Сергій Олександрович. "Програмні засоби підвищення продуктивності роботи СУБД MongoDB." Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/26713.
Full textActuality of theme. To date, MongoDB is a database, often used in the development of systems focused on the processing of poorly structured data. One reason for this is the ability to use horizontal scaling (shading) and data distribution settings, which greatly affects the performance of the system as a whole. Therefore, various strategies for data splitting in the cluster were developed, such as: a burning house strategy, hot spots strategy, and so on. These strategies have their own applications, their advantages and disadvantages, but the general disadvantage of these strategies is the uneven distribution of data in the presence of so-called "jumbo chunk", which in turn affects the performance of the system. The object of the study is the distribution of data between servers in the MongoDB cluster. The subject of the study is software tools to improve the performance of the MongoDB database, which are designed to configure the distribution of data in accordance with the permissible percentage loads of nodes of the cluster, taking into account the influence of "jumbo chunks". The purpose of the work: to increase the productivity of the DBMS MongoDB. Scientific novelty: 1. A data-sharing approach is proposed that incorporates the ideas of existing approaches and, unlike existing approaches, takes into account the possibility of having "jumbo chunks" when distributing data. 2. A comparative analysis of the proposed approach with existing ones is made, it is determined in what situations it is necessary to use this approach of approach, its advantages and disadvantages in comparison with existing approaches of data distribution. The practical value of the results obtained in the work is that the proposed approach provides the possibility of adjusting the distribution of data in accordance with the permissible percentages of nodes of the cluster, taking into account the influence of "jumbo chunks". In addition, the software developed in the work can be used to implement automated data distribution with the specified settings. Test work. The proposed approach was presented and discussed at the scientific conference of undergraduates and postgraduates "Applied Mathematics and Computing", PMK-2018 (Kyiv, November 14-16, 2018) and at the V International Scientific and Technical Internet Conference "Modern Methods, Information, software and technical support of control systems for organizational, technical and technological complexes", held on November 22, 2018 at the National University of Food Technologies. Structure and scope of work. The master's thesis consists of an introduction, four chapters and conclusions. The introduction gives a general description of the work, assesses the current state of the problem, substantiates the relevance of the research direction, formulates the purpose and objectives of the research, shows the scientific novelty of the results obtained. The first chapter examines the existing approaches to data distribution, their features, disadvantages and advantages, and discusses different implementations. The second chapter proposes a data-sharing approach that addresses the problem identified. The third chapter, algorithmic features of implementation of the developed software tools for implementation of the proposed approach are presented. The fourth chapter presents the results of testing the proposed approach. The conclusions are the results of the work. The master's dissertation is presented on 80 sheets, contains a link to the list of used literary sources.
Актуальность темы. На сегодняшний день MongoDB является СУБД, которая часто используется при разработке систем, ориентированных на обработку слабо структурированных данных. Одной из причин этого является возможность использования горизонтального масштабирования (шардингу) и настройки распределения данных, что в значительной мере влияет на производительность работы системы в целом. Поэтому были разработаны различные стратегии распределения данных в кластере, такие как: стратегия горящего дома, стратегия горячих точек и тому подобное. Данные стратегии имеют свои области применения, свои преимущества и недостатки, но общим недостатком данных стратегий является неравномерное распределение данных при наличии так называемых «джамбо-чанков», что в свою очередь влияет на производительность работы системы. Объектом исследования является распределение данных между серверами в кластере MongoDB. Предметом исследования являются программные средства для повышения производительности работы СУБД MongoDB, которые предназначены для настройки распределения данных в соответствии с допустимых процентных нагрузок узлов кластера, учитывая влияние «джамбо-чанков». Цель работы: повышение производительности работы СУБД MongoDB. Научная новизна: 1. Предложен подход распределения данных, который включает в себя идеи существующих подходов и, в отличие от существующих подходов, при распределении данных учитывает возможность наличия «джамбо-чанков». 2. Выполнен сравнительный анализ предложенного подхода с существующими, определено в каких именно ситуациях нужно использовать данный подход, его преимущества и недостатки по сравнению с существующими подходами распределения данных. Практическая ценность полученных в работе результатов заключается в том, что предложенный подход предоставляет возможность настройки распределения данных в соответствии с допустимыми процентных нагрузками узлов кластера, учитывая влияние «джамбо-чанков». Кроме того разработанные в работе программные средства могут быть использованы для реализации автоматизированного распределения данных с заданными настройками. Апробация работы. Предложенный подход был представлен и обсужден на научной конференции магистрантов и аспирантов «Прикладная математика и компьютинг» ПМК-2018 (Киев, 14 - 16 ноября 2018) и на V Международной научно-технической Internet-конференции «Современные методы, информационное, программное и техническое обеспечение систем управления организационно-техническими и технологическими комплексами», которая проводилась 22 ноября 2018 в Национальном университете пищевых технологий. Структура и объем работы. Магистерская диссертация состоит из введения, четырех глав и выводов. Во введении представлена общая характеристика работы, произведена оценка современного состояния проблемы, обоснована актуальность направления исследований, сформулированы цели и задачи исследований, показано научную новизну полученных результатов. В первой главе рассмотрены существующие подходы распределения данных, их особенности, недостатки и преимущества, рассмотрены различные реализации. Во втором разделе предложено подход распределения данных который будет решать обнаруженную проблему. В третьем разделе приведены алгоритмические особенности реализации разработанных программных средств для реализации предложенного подхода. В четвертом разделе представлены результаты тестирования предложенного подхода. В выводах представлены результаты проведенной работы. Магистерская диссертация представлена на 80 листах, содержит ссылки на список использованных литературных источников.
Yan, Weiwei. "Software-hardware Cooperative Embedded Verification System Fusing Fingerprint Verification and Shared-key Authentication." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66677.
Full textTomescu, Nicolescu Ioan Alin. "How to keep a secret and share a public key (using polynomial commitments)." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/128298.
Full textThesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2020
Cataloged from PDF of thesis.
Includes bibliographical references (pages 155-171).
Despite 40+ years of amazing progress, cryptography is constantly plagued by two simple problems: keeping secret keys secret and making public keys public. For example, public-key encryption is secure only if each user (1) keeps his secret key out of the hands of the adversary and (2) correctly distributes his public key to all other users. This thesis seeks to address these two fundamental problems. First, we introduce communication-efficient, fully-untrusted append-only logs, which can be used to correctly distribute public keys. Our constructions have logarithmic-sized proofs for the two key operations in append-only logs: looking up public keys and verifying the log remained append-only. In contrast, previous logs either have linear-sized proofs or need extra trust assumptions. Our logs can also be used to secure software distribution and, we hope, to increase transparency in any institution that wants to do so. Second, we speed up threshold cryptosystems, which protect secret keys by splitting them up across many users. We introduce threshold signatures, verifiable secret sharing and distributed key generation protocols that can scale to millions of users. Our protocols drastically reduce execution time, anywhere from 2x to 4500x, depending on the scale. For example, at large scales, we reduce time from tens of hours to tens of seconds. At the core of most of our contributions lie new techniques for computing evaluation proofs in constant-sized polynomial commitments. Specifically, we show how to decrease the time to compute n proofs for a degree-bound n polynomial from O(n²) to O(n log n), at the cost of increasing proof size from O(1) to O(log n). Our techniques could be of independent interest, as they give rise to other cryptographic schemes, such as Vector Commitments (VCs).
by Ioan Alin Tomescu Nicolescu.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Ehsan, ul Haque Muhammad. "Persistence and Node FailureRecovery in Strongly Consistent Key-Value Datastore." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121281.
Full textMunjid, Achmad. "Building a Shared Home: Investigating the Intellectual Legacy of the Key Thinkers of Inter-Religious Dialogue in Indonesia." Diss., Temple University Libraries, 2014. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/290756.
Full textPh.D.
How does inter-religious dialogue in Indonesia transform and being transformed by the New Order authoritarian regime in the creation of a strong civil society and a religiously plural and democratic country? By discussing the politicization of religion and mobilization of religious communities by the New Order regime to fight against the Communists in the wake of the 1965 tragedy as the background, this dissertation seeks to analyze the anatomy of inter-religious relations in the country, including its historical roots, pivotal events, enduring issues and consequential development in the later period. The discussion is placed in a wider theoretical context on the role of religion in public life. Based on the analysis of topical biography, academic works, media reports and other reliable unpublished documents as the main sources, the dissertation investigates the intellectual legacy of four selected key thinkers in the field of inter-religious dialogue. It critically discusses the complex interplay between religion and politics in particular relation to such issues as religious pluralism, religious tolerance, exclusivism, human rights, freedom of religion, legal discrimination, and minority-majority relations. It highlights why and how the contesting discourse within a particular religious community about other group, between different religious communities, especially the Muslims and the Christians, as well as between religious communities and the regime move toward certain direction in particular context and then move towards the opposite direction in other context. Despite the wide spread conflict towards the end of the New Order regime and during the 2000s, the dissertation proved that inter-religious relations in Indonesia in general developed from antagonism to more dialogical relations over the period. The four selected key thinkers of inter-religious dialogue and their intellectual legacy demonstrated how religion could make fundamental contribution in the creation of democracy in a religiously plural society.
Temple University--Theses
Sontheimer, Christoph, and Benjamin Czubacki. "Shark Repellents : Predicting the Takeover-Likelihood by Means of Pre-emptive Anti-Takeover Provisions & Key Performance Indicators." Thesis, Umeå universitet, Företagsekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-157457.
Full textWarr, Dartanian Warr. "THE PROFESSIONAL DEVELOPMENT MINDSET:A KEY INGREDIENT IN THE DEVELOPMENT OF LEADERS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=case15227478737613.
Full textSmith, Henry Mike. "A project to train a key leader group in the concept of shared ministry in Calvary Baptist Church, Meridian, Mississippi." Theological Research Exchange Network (TREN), 1991. http://www.tren.com.
Full textChakravarthy, Chinna Narayana Swamy Thrilok. "Combinational Watermarking for Medical Images." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5833.
Full textSchirninger, Rene, and Stefan Zeppetzauer. "Wireless On-Board Diagnostics." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-193.
Full textWireless On-board diagnostics functionality, which is a future outlook to vehicle system
parameter analysis, enables measurements and controlling without the limitation of a physical
connector. Today every vehicle must by law provide the possibility to analyze engine and
emission related parameters (OBD II). The wireless connection requires a high security level
to prevent unauthorized communication establishment with the truck’s bus system. The aim
of the project is to make a survey of the available security mechanisms and to find the most
promising solutions. Furthermore, several usage scenarios and access right levels are
specified and a risk analysis of the whole system is made. The greatest challenge is the
specification and implementation of a proper key-exchange mechanism between the analyzing
device and the truck’s bus system, which is therefore carried out with the highest possible
level of awareness. Consequently several different concepts have been formulated based on
the different usage scenarios.
Books on the topic "Shard key"
ill, Muchmore Pat, ed. Survival at Big Shark Key. Logan, IA: Perfection Learning, 2000.
Find full textChannel analysis: The key to share price prediction. Bramhall: Qudos, 1990.
Find full textJ, Millard Brian. Channel analysis: The key to share price prediction. 2nd ed. Chichester, England: J. Wiley, 1997.
Find full textAnn, Lewis. Share at key stage 2: Pilot project 1999. Coventry: CEDC, 2000.
Find full textJenny, McWhirter, ed. Science share books. Basingstoke: Macmillan, 1991.
Find full textWetton, Noreen. Science share books. Walton-on-Thames: Nelson, 1992.
Find full textPractices, LLC Best. Lessons learned in managing change: Benchmark partners share key insights. Chapel Hill, NC (6350 Quadrangle Drive, Suite 200, Chapel Hill 27517): Best Practices, 2002.
Find full textL, Root Hilton, ed. The key to the Asian miracle: Making shared growth credible. Washington, D.C: Brookings Institution, 1996.
Find full textThe heart of success: Masters of success share key secrets from within. Singapore: Spirit of Enterprise, 2011.
Find full textFerrara, Joseph Angelo. Flute fingering at a glance: For Boehm flute with closed G-sharp key. [United States]: J.A. Ferrara, 1990.
Find full textBook chapters on the topic "Shard key"
Sheikh, Rizwan Amin. "Key Challenges Facing the GMS Project." In Blue Shark Team-Building, 145–48. Boca Raton: Auerbach Publications, 2021. http://dx.doi.org/10.1201/9781003216711-10.
Full textBoyd, Colin, Anish Mathuria, and Douglas Stebila. "Protocols Using Shared Key Cryptography." In Protocols for Authentication and Key Establishment, 95–134. Berlin, Heidelberg: Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-58146-9_3.
Full textBoyd, Colin, and Anish Mathuria. "Protocols Using Shared Key Cryptography." In Protocols for Authentication and Key Establishment, 73–106. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-09527-0_3.
Full textFrankel, Yair, Philip MacKenzie, and Moti Yung. "“Pseudorandom Intermixing”: A Tool for Shared Cryptography." In Public Key Cryptography, 306–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-540-46588-1_21.
Full textJin, Ying, Jian Hua Wu, Long Quan Liu, and Zhen Qiang Yao. "The Cutting Energy of Rubber Cutting by a Sharp Cutter." In Key Engineering Materials, 3072–75. Stafa: Trans Tech Publications Ltd., 2007. http://dx.doi.org/10.4028/0-87849-456-1.3072.
Full textLee, Yonghwan, Eunmi Choi, and Dugki Min. "An Authenticated Key Exchange Mechanism Using One-Time Shared Key." In Computational Science and Its Applications – ICCSA 2005, 187–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11424826_20.
Full textBlake-Wilson, Simon, and Alfred Menezes. "Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol." In Public Key Cryptography, 154–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-49162-7_12.
Full textMohassel, Payman, and Matthew Franklin. "Efficient Polynomial Operations in the Shared-Coefficients Setting." In Public Key Cryptography - PKC 2006, 44–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11745853_4.
Full textOng, Emil, and John Kubiatowicz. "Optimizing Robustness While Generating Shared Secret Safe Primes." In Public Key Cryptography - PKC 2005, 120–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30580-4_9.
Full textPadmavathy, R., and Chakravarthy Bhagvati. "Unknown Key Share Attack on STPKE’ Protocol." In Communications in Computer and Information Science, 605–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_111.
Full textConference papers on the topic "Shard key"
Wang, Shuo, and Ning Li. "MYCAT Shard Key Selection Strategy Based on Exponential Smoothing." In 2018 2nd IEEE Advanced Information Management,Communicates, Electronic and Automation Control Conference (IMCEC). IEEE, 2018. http://dx.doi.org/10.1109/imcec.2018.8469634.
Full textZongshui, Xiao, Lanju Kong, Qingzhong Li, and Pang Cheng. "Global Index Oriented Non-Shard Key for Multi-tenant Database." In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM). IEEE, 2015. http://dx.doi.org/10.1109/cit/iucc/dasc/picom.2015.123.
Full textCastiglione, Arcangelo, Alfredo De Santis, and Barbara Masucci. "Hierarchical and Shared Key Assignment." In 2014 17th International Conference on Network-Based Information Systems (NBiS). IEEE, 2014. http://dx.doi.org/10.1109/nbis.2014.106.
Full textKang, Wei, and Nan Liu. "Wiretap channel with shared key." In 2010 IEEE Information Theory Workshop (ITW 2010). IEEE, 2010. http://dx.doi.org/10.1109/cig.2010.5592665.
Full textBentajer, Ahmed, Mustapha Hedabou, Sara Ennaama, and Abderrahim Tahiri. "Secure Cloud Key Management based on Robust Secret Sharing." In 10th International Conference on Information Technology Convergence and Services (ITCSE 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110913.
Full textRamírez-Macías, Dení, and Georgina Saad. "Key elements for managing whale shark tourism in the Gulf of California." In The 4th International Whale Shark Conference. Hamad bin Khalifa University Press (HBKU Press), 2016. http://dx.doi.org/10.5339/qproc.2016.iwsc4.47.
Full textAldaghri, Nasser, and Hessam Mahdavifar. "Threshold-Secure Coding with Shared Key." In 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2019. http://dx.doi.org/10.1109/allerton.2019.8919868.
Full textZhao, Jun. "Sharp transitions in random key graphs." In 2015 53rd Annual Allerton Conference on Communication, Control and Computing (Allerton). IEEE, 2015. http://dx.doi.org/10.1109/allerton.2015.7447142.
Full textCsiszar, Imre, and Prakash Narayan. "Capacity of a shared secret key." In 2010 IEEE International Symposium on Information Theory - ISIT. IEEE, 2010. http://dx.doi.org/10.1109/isit.2010.5513769.
Full textYuzuguzel, Hidir, Jari Niemi, Serkan Kiranyaz, Moncef Gabbouj, and Thomas Heinz. "ShakeMe: Key Generation from Shared Motion." In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM). IEEE, 2015. http://dx.doi.org/10.1109/cit/iucc/dasc/picom.2015.316.
Full textReports on the topic "Shard key"
Poovendran, R., M. S. Corson, and J. S. Baras. A Distributed Shared Key Generation Procedure Using Fractional Keys. Fort Belvoir, VA: Defense Technical Information Center, January 1998. http://dx.doi.org/10.21236/ada442651.
Full textHarkins, D. Secure Pre-Shared Key (PSK) Authentication for the Internet Key Exchange Protocol (IKE). RFC Editor, June 2012. http://dx.doi.org/10.17487/rfc6617.
Full textEronen, P., and H. Tschofenig, eds. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). RFC Editor, December 2005. http://dx.doi.org/10.17487/rfc4279.
Full textClancy, T., and H. Tschofenig. Extensible Authentication Protocol - Generalized Pre-Shared Key (EAP-GPSK) Method. RFC Editor, February 2009. http://dx.doi.org/10.17487/rfc5433.
Full textPerkins, C. Securing Mobile IPv6 Route Optimization Using a Static Shared Key. RFC Editor, June 2006. http://dx.doi.org/10.17487/rfc4449.
Full textHousley, R. Using Pre-Shared Key (PSK) in the Cryptographic Message Syntax (CMS). RFC Editor, December 2019. http://dx.doi.org/10.17487/rfc8696.
Full textVanderveen, M., and H. Soliman. Extensible Authentication Protocol Method for Shared-secret Authentication and Key Establishment (EAP-SAKE). RFC Editor, November 2006. http://dx.doi.org/10.17487/rfc4763.
Full textBlumenthal, U., and P. Goel. Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS). RFC Editor, January 2007. http://dx.doi.org/10.17487/rfc4785.
Full textBersani, F., and H. Tschofenig. The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method. RFC Editor, January 2007. http://dx.doi.org/10.17487/rfc4764.
Full textHousley, R. TLS 1.3 Extension for Certificate-Based Authentication with an External Pre-Shared Key. RFC Editor, March 2020. http://dx.doi.org/10.17487/rfc8773.
Full text