Добірка наукової літератури з теми "Shard key"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Shard key".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Shard key"
Hao, Jun, Jun Chen, and Qin Chen. "Floating Charge Method Based on Shared Parking." Sustainability 11, no. 1 (December 23, 2018): 72. http://dx.doi.org/10.3390/su11010072.
Повний текст джерелаGórniak, K., T. Szydłak, A. Gaweł, A. Klimek, A. Tomczyk, B. Sulikowski, Z. Olejniczak, J. Motyka, E. M. Serwicka, and K. Bahranowski. "Commercial bentonite from the Kopernica deposit (Tertiary, Slovakia): a petrographic and mineralogical approach." Clay Minerals 51, no. 1 (March 2016): 97–122. http://dx.doi.org/10.1180/claymin.2016.051.1.09.
Повний текст джерелаKrukov, S. A., N. V. Baydakova, and V. M. Shumyacher. "Determining the Volume-size Pore Space Parameters in the Grinding Wheels." Mechanical Engineering and Computer Science, no. 5 (June 21, 2018): 1–8. http://dx.doi.org/10.24108/0518.0001391.
Повний текст джерелаKim, Jeongin, and Namhi Kang. "Secure Configuration Scheme of Pre-shared Key for Lightweight Devices in Internet of Things." Journal of The Institute of Internet, Broadcasting and Communication 15, no. 3 (June 30, 2015): 1–6. http://dx.doi.org/10.7236/jiibc.2015.15.3.1.
Повний текст джерелаNdzi, Ernestine. "Shared parental leave: awareness is key." International Journal of Law and Management 59, no. 6 (November 13, 2017): 1331–36. http://dx.doi.org/10.1108/ijlma-07-2017-0160.
Повний текст джерелаAl-Fandi, Audai. "Symmetric Volatile Shared Key Encryption: A Two-way Communication Shared Key Encryption." Mathematics and Computer Science 2, no. 3 (2017): 27. http://dx.doi.org/10.11648/j.mcs.20170203.11.
Повний текст джерелаBaker, Monya. "Repositories share key research tools." Nature 505, no. 7483 (January 2014): 272. http://dx.doi.org/10.1038/505272a.
Повний текст джерелаB. Melo, Nicholas, and Tetsuyou Watanabe. "Key Posture Extraction from Object Manipulations Experiments." Advanced Engineering Forum 2-3 (December 2011): 308–13. http://dx.doi.org/10.4028/www.scientific.net/aef.2-3.308.
Повний текст джерелаCai, Binbin, Gongde Guo, and Song Lin. "Multi-party quantum key agreement with teleportation." Modern Physics Letters B 31, no. 10 (April 10, 2017): 1750102. http://dx.doi.org/10.1142/s0217984917501020.
Повний текст джерелаShim, Kyungah. "Unknown key-share attack on authenticated multiple-key agreement protocol." Electronics Letters 39, no. 1 (2003): 38. http://dx.doi.org/10.1049/el:20030076.
Повний текст джерелаДисертації з теми "Shard key"
Даценко, Сергій Олександрович. "Програмні засоби підвищення продуктивності роботи СУБД MongoDB". Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/26713.
Повний текст джерелаActuality of theme. To date, MongoDB is a database, often used in the development of systems focused on the processing of poorly structured data. One reason for this is the ability to use horizontal scaling (shading) and data distribution settings, which greatly affects the performance of the system as a whole. Therefore, various strategies for data splitting in the cluster were developed, such as: a burning house strategy, hot spots strategy, and so on. These strategies have their own applications, their advantages and disadvantages, but the general disadvantage of these strategies is the uneven distribution of data in the presence of so-called "jumbo chunk", which in turn affects the performance of the system. The object of the study is the distribution of data between servers in the MongoDB cluster. The subject of the study is software tools to improve the performance of the MongoDB database, which are designed to configure the distribution of data in accordance with the permissible percentage loads of nodes of the cluster, taking into account the influence of "jumbo chunks". The purpose of the work: to increase the productivity of the DBMS MongoDB. Scientific novelty: 1. A data-sharing approach is proposed that incorporates the ideas of existing approaches and, unlike existing approaches, takes into account the possibility of having "jumbo chunks" when distributing data. 2. A comparative analysis of the proposed approach with existing ones is made, it is determined in what situations it is necessary to use this approach of approach, its advantages and disadvantages in comparison with existing approaches of data distribution. The practical value of the results obtained in the work is that the proposed approach provides the possibility of adjusting the distribution of data in accordance with the permissible percentages of nodes of the cluster, taking into account the influence of "jumbo chunks". In addition, the software developed in the work can be used to implement automated data distribution with the specified settings. Test work. The proposed approach was presented and discussed at the scientific conference of undergraduates and postgraduates "Applied Mathematics and Computing", PMK-2018 (Kyiv, November 14-16, 2018) and at the V International Scientific and Technical Internet Conference "Modern Methods, Information, software and technical support of control systems for organizational, technical and technological complexes", held on November 22, 2018 at the National University of Food Technologies. Structure and scope of work. The master's thesis consists of an introduction, four chapters and conclusions. The introduction gives a general description of the work, assesses the current state of the problem, substantiates the relevance of the research direction, formulates the purpose and objectives of the research, shows the scientific novelty of the results obtained. The first chapter examines the existing approaches to data distribution, their features, disadvantages and advantages, and discusses different implementations. The second chapter proposes a data-sharing approach that addresses the problem identified. The third chapter, algorithmic features of implementation of the developed software tools for implementation of the proposed approach are presented. The fourth chapter presents the results of testing the proposed approach. The conclusions are the results of the work. The master's dissertation is presented on 80 sheets, contains a link to the list of used literary sources.
Актуальность темы. На сегодняшний день MongoDB является СУБД, которая часто используется при разработке систем, ориентированных на обработку слабо структурированных данных. Одной из причин этого является возможность использования горизонтального масштабирования (шардингу) и настройки распределения данных, что в значительной мере влияет на производительность работы системы в целом. Поэтому были разработаны различные стратегии распределения данных в кластере, такие как: стратегия горящего дома, стратегия горячих точек и тому подобное. Данные стратегии имеют свои области применения, свои преимущества и недостатки, но общим недостатком данных стратегий является неравномерное распределение данных при наличии так называемых «джамбо-чанков», что в свою очередь влияет на производительность работы системы. Объектом исследования является распределение данных между серверами в кластере MongoDB. Предметом исследования являются программные средства для повышения производительности работы СУБД MongoDB, которые предназначены для настройки распределения данных в соответствии с допустимых процентных нагрузок узлов кластера, учитывая влияние «джамбо-чанков». Цель работы: повышение производительности работы СУБД MongoDB. Научная новизна: 1. Предложен подход распределения данных, который включает в себя идеи существующих подходов и, в отличие от существующих подходов, при распределении данных учитывает возможность наличия «джамбо-чанков». 2. Выполнен сравнительный анализ предложенного подхода с существующими, определено в каких именно ситуациях нужно использовать данный подход, его преимущества и недостатки по сравнению с существующими подходами распределения данных. Практическая ценность полученных в работе результатов заключается в том, что предложенный подход предоставляет возможность настройки распределения данных в соответствии с допустимыми процентных нагрузками узлов кластера, учитывая влияние «джамбо-чанков». Кроме того разработанные в работе программные средства могут быть использованы для реализации автоматизированного распределения данных с заданными настройками. Апробация работы. Предложенный подход был представлен и обсужден на научной конференции магистрантов и аспирантов «Прикладная математика и компьютинг» ПМК-2018 (Киев, 14 - 16 ноября 2018) и на V Международной научно-технической Internet-конференции «Современные методы, информационное, программное и техническое обеспечение систем управления организационно-техническими и технологическими комплексами», которая проводилась 22 ноября 2018 в Национальном университете пищевых технологий. Структура и объем работы. Магистерская диссертация состоит из введения, четырех глав и выводов. Во введении представлена общая характеристика работы, произведена оценка современного состояния проблемы, обоснована актуальность направления исследований, сформулированы цели и задачи исследований, показано научную новизну полученных результатов. В первой главе рассмотрены существующие подходы распределения данных, их особенности, недостатки и преимущества, рассмотрены различные реализации. Во втором разделе предложено подход распределения данных который будет решать обнаруженную проблему. В третьем разделе приведены алгоритмические особенности реализации разработанных программных средств для реализации предложенного подхода. В четвертом разделе представлены результаты тестирования предложенного подхода. В выводах представлены результаты проведенной работы. Магистерская диссертация представлена на 80 листах, содержит ссылки на список использованных литературных источников.
Yan, Weiwei. "Software-hardware Cooperative Embedded Verification System Fusing Fingerprint Verification and Shared-key Authentication." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66677.
Повний текст джерелаTomescu, Nicolescu Ioan Alin. "How to keep a secret and share a public key (using polynomial commitments)." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/128298.
Повний текст джерелаThesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2020
Cataloged from PDF of thesis.
Includes bibliographical references (pages 155-171).
Despite 40+ years of amazing progress, cryptography is constantly plagued by two simple problems: keeping secret keys secret and making public keys public. For example, public-key encryption is secure only if each user (1) keeps his secret key out of the hands of the adversary and (2) correctly distributes his public key to all other users. This thesis seeks to address these two fundamental problems. First, we introduce communication-efficient, fully-untrusted append-only logs, which can be used to correctly distribute public keys. Our constructions have logarithmic-sized proofs for the two key operations in append-only logs: looking up public keys and verifying the log remained append-only. In contrast, previous logs either have linear-sized proofs or need extra trust assumptions. Our logs can also be used to secure software distribution and, we hope, to increase transparency in any institution that wants to do so. Second, we speed up threshold cryptosystems, which protect secret keys by splitting them up across many users. We introduce threshold signatures, verifiable secret sharing and distributed key generation protocols that can scale to millions of users. Our protocols drastically reduce execution time, anywhere from 2x to 4500x, depending on the scale. For example, at large scales, we reduce time from tens of hours to tens of seconds. At the core of most of our contributions lie new techniques for computing evaluation proofs in constant-sized polynomial commitments. Specifically, we show how to decrease the time to compute n proofs for a degree-bound n polynomial from O(n²) to O(n log n), at the cost of increasing proof size from O(1) to O(log n). Our techniques could be of independent interest, as they give rise to other cryptographic schemes, such as Vector Commitments (VCs).
by Ioan Alin Tomescu Nicolescu.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Ehsan, ul Haque Muhammad. "Persistence and Node FailureRecovery in Strongly Consistent Key-Value Datastore." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121281.
Повний текст джерелаMunjid, Achmad. "Building a Shared Home: Investigating the Intellectual Legacy of the Key Thinkers of Inter-Religious Dialogue in Indonesia." Diss., Temple University Libraries, 2014. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/290756.
Повний текст джерелаPh.D.
How does inter-religious dialogue in Indonesia transform and being transformed by the New Order authoritarian regime in the creation of a strong civil society and a religiously plural and democratic country? By discussing the politicization of religion and mobilization of religious communities by the New Order regime to fight against the Communists in the wake of the 1965 tragedy as the background, this dissertation seeks to analyze the anatomy of inter-religious relations in the country, including its historical roots, pivotal events, enduring issues and consequential development in the later period. The discussion is placed in a wider theoretical context on the role of religion in public life. Based on the analysis of topical biography, academic works, media reports and other reliable unpublished documents as the main sources, the dissertation investigates the intellectual legacy of four selected key thinkers in the field of inter-religious dialogue. It critically discusses the complex interplay between religion and politics in particular relation to such issues as religious pluralism, religious tolerance, exclusivism, human rights, freedom of religion, legal discrimination, and minority-majority relations. It highlights why and how the contesting discourse within a particular religious community about other group, between different religious communities, especially the Muslims and the Christians, as well as between religious communities and the regime move toward certain direction in particular context and then move towards the opposite direction in other context. Despite the wide spread conflict towards the end of the New Order regime and during the 2000s, the dissertation proved that inter-religious relations in Indonesia in general developed from antagonism to more dialogical relations over the period. The four selected key thinkers of inter-religious dialogue and their intellectual legacy demonstrated how religion could make fundamental contribution in the creation of democracy in a religiously plural society.
Temple University--Theses
Sontheimer, Christoph, and Benjamin Czubacki. "Shark Repellents : Predicting the Takeover-Likelihood by Means of Pre-emptive Anti-Takeover Provisions & Key Performance Indicators." Thesis, Umeå universitet, Företagsekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-157457.
Повний текст джерелаWarr, Dartanian Warr. "THE PROFESSIONAL DEVELOPMENT MINDSET:A KEY INGREDIENT IN THE DEVELOPMENT OF LEADERS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=case15227478737613.
Повний текст джерелаSmith, Henry Mike. "A project to train a key leader group in the concept of shared ministry in Calvary Baptist Church, Meridian, Mississippi." Theological Research Exchange Network (TREN), 1991. http://www.tren.com.
Повний текст джерелаChakravarthy, Chinna Narayana Swamy Thrilok. "Combinational Watermarking for Medical Images." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5833.
Повний текст джерелаSchirninger, Rene, and Stefan Zeppetzauer. "Wireless On-Board Diagnostics." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-193.
Повний текст джерелаWireless On-board diagnostics functionality, which is a future outlook to vehicle system
parameter analysis, enables measurements and controlling without the limitation of a physical
connector. Today every vehicle must by law provide the possibility to analyze engine and
emission related parameters (OBD II). The wireless connection requires a high security level
to prevent unauthorized communication establishment with the truck’s bus system. The aim
of the project is to make a survey of the available security mechanisms and to find the most
promising solutions. Furthermore, several usage scenarios and access right levels are
specified and a risk analysis of the whole system is made. The greatest challenge is the
specification and implementation of a proper key-exchange mechanism between the analyzing
device and the truck’s bus system, which is therefore carried out with the highest possible
level of awareness. Consequently several different concepts have been formulated based on
the different usage scenarios.
Книги з теми "Shard key"
ill, Muchmore Pat, ed. Survival at Big Shark Key. Logan, IA: Perfection Learning, 2000.
Знайти повний текст джерелаChannel analysis: The key to share price prediction. Bramhall: Qudos, 1990.
Знайти повний текст джерелаJ, Millard Brian. Channel analysis: The key to share price prediction. 2nd ed. Chichester, England: J. Wiley, 1997.
Знайти повний текст джерелаAnn, Lewis. Share at key stage 2: Pilot project 1999. Coventry: CEDC, 2000.
Знайти повний текст джерелаJenny, McWhirter, ed. Science share books. Basingstoke: Macmillan, 1991.
Знайти повний текст джерелаWetton, Noreen. Science share books. Walton-on-Thames: Nelson, 1992.
Знайти повний текст джерелаPractices, LLC Best. Lessons learned in managing change: Benchmark partners share key insights. Chapel Hill, NC (6350 Quadrangle Drive, Suite 200, Chapel Hill 27517): Best Practices, 2002.
Знайти повний текст джерелаL, Root Hilton, ed. The key to the Asian miracle: Making shared growth credible. Washington, D.C: Brookings Institution, 1996.
Знайти повний текст джерелаThe heart of success: Masters of success share key secrets from within. Singapore: Spirit of Enterprise, 2011.
Знайти повний текст джерелаFerrara, Joseph Angelo. Flute fingering at a glance: For Boehm flute with closed G-sharp key. [United States]: J.A. Ferrara, 1990.
Знайти повний текст джерелаЧастини книг з теми "Shard key"
Sheikh, Rizwan Amin. "Key Challenges Facing the GMS Project." In Blue Shark Team-Building, 145–48. Boca Raton: Auerbach Publications, 2021. http://dx.doi.org/10.1201/9781003216711-10.
Повний текст джерелаBoyd, Colin, Anish Mathuria, and Douglas Stebila. "Protocols Using Shared Key Cryptography." In Protocols for Authentication and Key Establishment, 95–134. Berlin, Heidelberg: Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-58146-9_3.
Повний текст джерелаBoyd, Colin, and Anish Mathuria. "Protocols Using Shared Key Cryptography." In Protocols for Authentication and Key Establishment, 73–106. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-09527-0_3.
Повний текст джерелаFrankel, Yair, Philip MacKenzie, and Moti Yung. "“Pseudorandom Intermixing”: A Tool for Shared Cryptography." In Public Key Cryptography, 306–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-540-46588-1_21.
Повний текст джерелаJin, Ying, Jian Hua Wu, Long Quan Liu, and Zhen Qiang Yao. "The Cutting Energy of Rubber Cutting by a Sharp Cutter." In Key Engineering Materials, 3072–75. Stafa: Trans Tech Publications Ltd., 2007. http://dx.doi.org/10.4028/0-87849-456-1.3072.
Повний текст джерелаLee, Yonghwan, Eunmi Choi, and Dugki Min. "An Authenticated Key Exchange Mechanism Using One-Time Shared Key." In Computational Science and Its Applications – ICCSA 2005, 187–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11424826_20.
Повний текст джерелаBlake-Wilson, Simon, and Alfred Menezes. "Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol." In Public Key Cryptography, 154–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-49162-7_12.
Повний текст джерелаMohassel, Payman, and Matthew Franklin. "Efficient Polynomial Operations in the Shared-Coefficients Setting." In Public Key Cryptography - PKC 2006, 44–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11745853_4.
Повний текст джерелаOng, Emil, and John Kubiatowicz. "Optimizing Robustness While Generating Shared Secret Safe Primes." In Public Key Cryptography - PKC 2005, 120–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30580-4_9.
Повний текст джерелаPadmavathy, R., and Chakravarthy Bhagvati. "Unknown Key Share Attack on STPKE’ Protocol." In Communications in Computer and Information Science, 605–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_111.
Повний текст джерелаТези доповідей конференцій з теми "Shard key"
Wang, Shuo, and Ning Li. "MYCAT Shard Key Selection Strategy Based on Exponential Smoothing." In 2018 2nd IEEE Advanced Information Management,Communicates, Electronic and Automation Control Conference (IMCEC). IEEE, 2018. http://dx.doi.org/10.1109/imcec.2018.8469634.
Повний текст джерелаZongshui, Xiao, Lanju Kong, Qingzhong Li, and Pang Cheng. "Global Index Oriented Non-Shard Key for Multi-tenant Database." In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM). IEEE, 2015. http://dx.doi.org/10.1109/cit/iucc/dasc/picom.2015.123.
Повний текст джерелаCastiglione, Arcangelo, Alfredo De Santis, and Barbara Masucci. "Hierarchical and Shared Key Assignment." In 2014 17th International Conference on Network-Based Information Systems (NBiS). IEEE, 2014. http://dx.doi.org/10.1109/nbis.2014.106.
Повний текст джерелаKang, Wei, and Nan Liu. "Wiretap channel with shared key." In 2010 IEEE Information Theory Workshop (ITW 2010). IEEE, 2010. http://dx.doi.org/10.1109/cig.2010.5592665.
Повний текст джерелаBentajer, Ahmed, Mustapha Hedabou, Sara Ennaama, and Abderrahim Tahiri. "Secure Cloud Key Management based on Robust Secret Sharing." In 10th International Conference on Information Technology Convergence and Services (ITCSE 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110913.
Повний текст джерелаRamírez-Macías, Dení, and Georgina Saad. "Key elements for managing whale shark tourism in the Gulf of California." In The 4th International Whale Shark Conference. Hamad bin Khalifa University Press (HBKU Press), 2016. http://dx.doi.org/10.5339/qproc.2016.iwsc4.47.
Повний текст джерелаAldaghri, Nasser, and Hessam Mahdavifar. "Threshold-Secure Coding with Shared Key." In 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2019. http://dx.doi.org/10.1109/allerton.2019.8919868.
Повний текст джерелаZhao, Jun. "Sharp transitions in random key graphs." In 2015 53rd Annual Allerton Conference on Communication, Control and Computing (Allerton). IEEE, 2015. http://dx.doi.org/10.1109/allerton.2015.7447142.
Повний текст джерелаCsiszar, Imre, and Prakash Narayan. "Capacity of a shared secret key." In 2010 IEEE International Symposium on Information Theory - ISIT. IEEE, 2010. http://dx.doi.org/10.1109/isit.2010.5513769.
Повний текст джерелаYuzuguzel, Hidir, Jari Niemi, Serkan Kiranyaz, Moncef Gabbouj, and Thomas Heinz. "ShakeMe: Key Generation from Shared Motion." In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM). IEEE, 2015. http://dx.doi.org/10.1109/cit/iucc/dasc/picom.2015.316.
Повний текст джерелаЗвіти організацій з теми "Shard key"
Poovendran, R., M. S. Corson, and J. S. Baras. A Distributed Shared Key Generation Procedure Using Fractional Keys. Fort Belvoir, VA: Defense Technical Information Center, January 1998. http://dx.doi.org/10.21236/ada442651.
Повний текст джерелаHarkins, D. Secure Pre-Shared Key (PSK) Authentication for the Internet Key Exchange Protocol (IKE). RFC Editor, June 2012. http://dx.doi.org/10.17487/rfc6617.
Повний текст джерелаEronen, P., and H. Tschofenig, eds. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). RFC Editor, December 2005. http://dx.doi.org/10.17487/rfc4279.
Повний текст джерелаClancy, T., and H. Tschofenig. Extensible Authentication Protocol - Generalized Pre-Shared Key (EAP-GPSK) Method. RFC Editor, February 2009. http://dx.doi.org/10.17487/rfc5433.
Повний текст джерелаPerkins, C. Securing Mobile IPv6 Route Optimization Using a Static Shared Key. RFC Editor, June 2006. http://dx.doi.org/10.17487/rfc4449.
Повний текст джерелаHousley, R. Using Pre-Shared Key (PSK) in the Cryptographic Message Syntax (CMS). RFC Editor, December 2019. http://dx.doi.org/10.17487/rfc8696.
Повний текст джерелаVanderveen, M., and H. Soliman. Extensible Authentication Protocol Method for Shared-secret Authentication and Key Establishment (EAP-SAKE). RFC Editor, November 2006. http://dx.doi.org/10.17487/rfc4763.
Повний текст джерелаBlumenthal, U., and P. Goel. Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS). RFC Editor, January 2007. http://dx.doi.org/10.17487/rfc4785.
Повний текст джерелаBersani, F., and H. Tschofenig. The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method. RFC Editor, January 2007. http://dx.doi.org/10.17487/rfc4764.
Повний текст джерелаHousley, R. TLS 1.3 Extension for Certificate-Based Authentication with an External Pre-Shared Key. RFC Editor, March 2020. http://dx.doi.org/10.17487/rfc8773.
Повний текст джерела