Journal articles on the topic 'Shard key'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Shard key.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hao, Jun, Jun Chen, and Qin Chen. "Floating Charge Method Based on Shared Parking." Sustainability 11, no. 1 (December 23, 2018): 72. http://dx.doi.org/10.3390/su11010072.
Full textGórniak, K., T. Szydłak, A. Gaweł, A. Klimek, A. Tomczyk, B. Sulikowski, Z. Olejniczak, J. Motyka, E. M. Serwicka, and K. Bahranowski. "Commercial bentonite from the Kopernica deposit (Tertiary, Slovakia): a petrographic and mineralogical approach." Clay Minerals 51, no. 1 (March 2016): 97–122. http://dx.doi.org/10.1180/claymin.2016.051.1.09.
Full textKrukov, S. A., N. V. Baydakova, and V. M. Shumyacher. "Determining the Volume-size Pore Space Parameters in the Grinding Wheels." Mechanical Engineering and Computer Science, no. 5 (June 21, 2018): 1–8. http://dx.doi.org/10.24108/0518.0001391.
Full textKim, Jeongin, and Namhi Kang. "Secure Configuration Scheme of Pre-shared Key for Lightweight Devices in Internet of Things." Journal of The Institute of Internet, Broadcasting and Communication 15, no. 3 (June 30, 2015): 1–6. http://dx.doi.org/10.7236/jiibc.2015.15.3.1.
Full textNdzi, Ernestine. "Shared parental leave: awareness is key." International Journal of Law and Management 59, no. 6 (November 13, 2017): 1331–36. http://dx.doi.org/10.1108/ijlma-07-2017-0160.
Full textAl-Fandi, Audai. "Symmetric Volatile Shared Key Encryption: A Two-way Communication Shared Key Encryption." Mathematics and Computer Science 2, no. 3 (2017): 27. http://dx.doi.org/10.11648/j.mcs.20170203.11.
Full textBaker, Monya. "Repositories share key research tools." Nature 505, no. 7483 (January 2014): 272. http://dx.doi.org/10.1038/505272a.
Full textB. Melo, Nicholas, and Tetsuyou Watanabe. "Key Posture Extraction from Object Manipulations Experiments." Advanced Engineering Forum 2-3 (December 2011): 308–13. http://dx.doi.org/10.4028/www.scientific.net/aef.2-3.308.
Full textCai, Binbin, Gongde Guo, and Song Lin. "Multi-party quantum key agreement with teleportation." Modern Physics Letters B 31, no. 10 (April 10, 2017): 1750102. http://dx.doi.org/10.1142/s0217984917501020.
Full textShim, Kyungah. "Unknown key-share attack on authenticated multiple-key agreement protocol." Electronics Letters 39, no. 1 (2003): 38. http://dx.doi.org/10.1049/el:20030076.
Full textLin, Jen-Chiun, Kuo-Hsuan Huang, Feipei Lai, and Hung-Chang Lee. "Secure and efficient group key management with shared key derivation." Computer Standards & Interfaces 31, no. 1 (January 2009): 192–208. http://dx.doi.org/10.1016/j.csi.2007.11.005.
Full textLevin, Aaron. "Successful ACT Programs Share Key Elements." Psychiatric News 47, no. 11 (June 2012): 9–28. http://dx.doi.org/10.1176/pn.47.11.psychnews_47_11_9-a.
Full textBadra, M., and I. Hajjeh. "Key-Exchange Authentication Using Shared Secrets." Computer 39, no. 3 (March 2006): 58–66. http://dx.doi.org/10.1109/mc.2006.94.
Full textHe, Mingxing, Pingzhi Fan, and Xiaoqiang Zhang. "k-Party shared RSA key generation." Journal of Electronics (China) 20, no. 1 (January 2003): 51–56. http://dx.doi.org/10.1007/s11767-003-0087-6.
Full textZaverucha, Gregory M., and Douglas R. Stinson. "Anonymity in shared symmetric key primitives." Designs, Codes and Cryptography 57, no. 2 (January 20, 2010): 139–60. http://dx.doi.org/10.1007/s10623-009-9357-0.
Full textAldaghri, Nasser, and Hessam Mahdavifar. "Threshold-Secure Coding With Shared Key." IEEE Journal on Selected Areas in Information Theory 2, no. 1 (March 2021): 95–105. http://dx.doi.org/10.1109/jsait.2021.3053020.
Full textYANG, CHUN-WEI, and TZONELIH HWANG. "EFFICIENT KEY CONSTRUCTION ON SEMI-QUANTUM SECRET SHARING PROTOCOLS." International Journal of Quantum Information 11, no. 05 (August 2013): 1350052. http://dx.doi.org/10.1142/s0219749913500524.
Full textSchadler, Cornelia, Irene Rieder, Eva-Maria Schmidt, Ulrike Zartler, and Rudolf Richter. "Key practices of equality within long parental leaves." Journal of European Social Policy 27, no. 3 (January 17, 2017): 247–59. http://dx.doi.org/10.1177/0958928716685688.
Full textVasim Ahamad, Mohd, Misbah Urrahman Siddiqui, Maria Masroor, and Urooj Fatima. "An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key." International Journal of Engineering & Technology 7, no. 4.5 (September 22, 2018): 347. http://dx.doi.org/10.14419/ijet.v7i4.5.20104.
Full textKaliski, Burton S. "An unknown key-share attack on the MQV key agreement protocol." ACM Transactions on Information and System Security 4, no. 3 (August 2001): 275–88. http://dx.doi.org/10.1145/501978.501981.
Full textS, Mohanavalli, and Gori Mohamed J. "Private Key Management for Data Transfer with Shared Random Secret Key." International Journal of Computer Science and Engineering 3, no. 4 (April 25, 2016): 89–93. http://dx.doi.org/10.14445/23488387/ijcse-v3i4p119.
Full textAbdel Hakeem, Shimaa A., and HyungWon Kim. "Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication." Sensors 22, no. 1 (January 3, 2022): 331. http://dx.doi.org/10.3390/s22010331.
Full textMorrison, Colin. "Active Share: Key Insight or Flawed Measure?" CFA Institute Conference Proceedings Quarterly 33, no. 1 (January 2016): 42–48. http://dx.doi.org/10.2469/cp.v33.n1.5.
Full textEl-Awady, Nadia. "Shared knowledge is key to a kingdom." Nature 532, no. 7600 (April 2016): S16—S18. http://dx.doi.org/10.1038/532s16a.
Full textBob and S. Sudharsanan. "Shared key encryption of jpeg color images." IEEE Transactions on Consumer Electronics 51, no. 4 (November 2005): 1204–11. http://dx.doi.org/10.1109/tce.2005.1561845.
Full textGreenaway, Katharine H., Ruth G. Wright, Joanne Willingham, Katherine J. Reynolds, and S. Alexander Haslam. "Shared Identity Is Key to Effective Communication." Personality and Social Psychology Bulletin 41, no. 2 (November 21, 2014): 171–82. http://dx.doi.org/10.1177/0146167214559709.
Full textBiondi, Fabrizio, Thomas Given-Wilson, and Axel Legay. "Attainable unconditional security for shared-key cryptosystems." Information Sciences 369 (November 2016): 80–99. http://dx.doi.org/10.1016/j.ins.2016.06.019.
Full textEggert, Andreas, and Wolfgang Ulaga. "Managing customer share in key supplier relationships." Industrial Marketing Management 39, no. 8 (November 2010): 1346–55. http://dx.doi.org/10.1016/j.indmarman.2010.03.003.
Full textSamuel, Ajiri Peter, and Hillary O. Odor. "Knowledge Sharing: A Key Role in the Knowledge Management Process." International Journal of Business and Management Research 6, no. 2 (June 30, 2018): 36–40. http://dx.doi.org/10.37391/ijbmr.060204.
Full textZhou, Hong-Sheng, Lei Fan, and Jian-Hua Li. "Remarks on unknown key-share attack on authenticated multiple-key agreement protocol." Electronics Letters 39, no. 17 (2003): 1248. http://dx.doi.org/10.1049/el:20030804.
Full textViirret, Tuija Leena. "Shared experiencing, shared understandings: Intersubjectivity as a key phenomenon in drama education." Applied Theatre Research 6, no. 2 (November 1, 2018): 155–66. http://dx.doi.org/10.1386/atr.6.2.155_1.
Full textYoshida, Masakazu, Ayumu Nakayama, and Jun Cheng. "Distinguishability and Disturbance in the Quantum Key Distribution Protocol Using the Mean Multi-Kings’ Problem." Entropy 22, no. 11 (November 11, 2020): 1275. http://dx.doi.org/10.3390/e22111275.
Full textCorbett, Katharine T., and Howard S. (Dick) Miller. "A Shared Inquiry into Shared Inquiry." Public Historian 28, no. 1 (2006): 15–38. http://dx.doi.org/10.1525/tph.2006.28.1.15.
Full textPearce, Craig L., Christina L. Wassenaar, and Charles C. Manz. "Is Shared Leadership the Key to Responsible Leadership?" Academy of Management Perspectives 28, no. 3 (August 2014): 275–88. http://dx.doi.org/10.5465/amp.2014.0017.
Full textLee, Sonia, Andy Henwood, Tania Barnes, and Martin Wilkie. "Is collaboration the key to shared haemodialysis care?" Journal of Kidney Care 3, no. 6 (November 2, 2018): 388–89. http://dx.doi.org/10.12968/jokc.2018.3.6.388.
Full textBejou, David, and Azam Bejou. "Shared Governance: The Key to Higher Education Equilibrium." Journal of Relationship Marketing 15, no. 1-2 (April 2, 2016): 54–61. http://dx.doi.org/10.1080/15332667.2015.1091630.
Full textKIM, AJUNG. "METHODS OF SHARED KEY AGREEMENT IN COHERENT MULTIPLEXING." Modern Physics Letters B 18, no. 16 (July 10, 2004): 833–39. http://dx.doi.org/10.1142/s0217984904007384.
Full textSwarnkar, Mayank. "Transaction Security Using Input Based Shared Key Cryptography." IOSR Journal of Computer Engineering 7, no. 5 (2012): 55–60. http://dx.doi.org/10.9790/0661-0755560.
Full textFigueiredo, Alcidio Silva, and Luisa Helena Pinto. "Robotizing shared service centres: key challenges and outcomes." Journal of Service Theory and Practice 31, no. 1 (December 4, 2020): 157–78. http://dx.doi.org/10.1108/jstp-06-2020-0126.
Full textZhou, Jian, and Xian-wei Zhou. "Autonomous Shared Key Management Scheme for Space Networks." Wireless Personal Communications 72, no. 4 (April 3, 2013): 2425–43. http://dx.doi.org/10.1007/s11277-013-1156-2.
Full textTurle, Marcus. "Shared services: An outline of key contractual issues." Computer Law & Security Review 26, no. 2 (March 2010): 178–84. http://dx.doi.org/10.1016/j.clsr.2010.01.009.
Full textRahman, Rezaur, and Hossen Asiful Mustafa. "Securing IPv6 Neighbor Discovery using Pre-Shared Key." Advances in Science, Technology and Engineering Systems Journal 6, no. 2 (March 2021): 722–32. http://dx.doi.org/10.25046/aj060284.
Full textKezar, Adrianna. "Creating a diverse student success infrastructure: The key to serving today’s student body and catalyzing cultural change." International Journal of Chinese Education 10, no. 1 (April 20, 2021): 221258682110062. http://dx.doi.org/10.1177/22125868211006204.
Full textKr. Naskar, Prabir, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, and Atal Chaudhuri. "Shared Cryptography with Embedded Session Key for Secret Audio." International Journal of Computer Applications 26, no. 8 (July 31, 2011): 5–9. http://dx.doi.org/10.5120/3128-4305.
Full textChakraborty, Kalyan, and Jay Mehta. "Preventing Unknown Key-Share Attack using Cryptographic Bilinear Maps." Journal of Discrete Mathematical Sciences and Cryptography 17, no. 2 (March 4, 2014): 135–47. http://dx.doi.org/10.1080/09720529.2013.842035.
Full textWang, Haowei, Xiaofeng Tao, Na Li, and Zhu Han. "Polar Coding for the Wiretap Channel With Shared Key." IEEE Transactions on Information Forensics and Security 13, no. 6 (June 2018): 1351–60. http://dx.doi.org/10.1109/tifs.2017.2774499.
Full textShiell, Richard. "Sharp Trephines – The Key to Optimum Punch Graft Surgery." Facial Plastic Surgery 2, no. 03 (January 1985): 231–33. http://dx.doi.org/10.1055/s-0028-1085279.
Full textSalzberg, Steven, Elodie Ghedin, and David Spiro. "Shared data are key to beating threat from flu." Nature 440, no. 7084 (March 2006): 605. http://dx.doi.org/10.1038/440605a.
Full textLu, Youjing, Fan Wu, Qianyi Huang, Shaojie Tang, Linghe Kong, and Guihai Chen. "Shared Secret Key Generation by Exploiting Inaudible Acoustic Channels." ACM Transactions on Sensor Networks 18, no. 1 (February 28, 2022): 1–26. http://dx.doi.org/10.1145/3480461.
Full textLu, Youjing, Fan Wu, Qianyi Huang, Shaojie Tang, Linghe Kong, and Guihai Chen. "Shared Secret Key Generation by Exploiting Inaudible Acoustic Channels." ACM Transactions on Sensor Networks 18, no. 1 (February 28, 2022): 1–26. http://dx.doi.org/10.1145/3480461.
Full text