Статті в журналах з теми "Shard key"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Shard key".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Hao, Jun, Jun Chen, and Qin Chen. "Floating Charge Method Based on Shared Parking." Sustainability 11, no. 1 (December 23, 2018): 72. http://dx.doi.org/10.3390/su11010072.
Повний текст джерелаGórniak, K., T. Szydłak, A. Gaweł, A. Klimek, A. Tomczyk, B. Sulikowski, Z. Olejniczak, J. Motyka, E. M. Serwicka, and K. Bahranowski. "Commercial bentonite from the Kopernica deposit (Tertiary, Slovakia): a petrographic and mineralogical approach." Clay Minerals 51, no. 1 (March 2016): 97–122. http://dx.doi.org/10.1180/claymin.2016.051.1.09.
Повний текст джерелаKrukov, S. A., N. V. Baydakova, and V. M. Shumyacher. "Determining the Volume-size Pore Space Parameters in the Grinding Wheels." Mechanical Engineering and Computer Science, no. 5 (June 21, 2018): 1–8. http://dx.doi.org/10.24108/0518.0001391.
Повний текст джерелаKim, Jeongin, and Namhi Kang. "Secure Configuration Scheme of Pre-shared Key for Lightweight Devices in Internet of Things." Journal of The Institute of Internet, Broadcasting and Communication 15, no. 3 (June 30, 2015): 1–6. http://dx.doi.org/10.7236/jiibc.2015.15.3.1.
Повний текст джерелаNdzi, Ernestine. "Shared parental leave: awareness is key." International Journal of Law and Management 59, no. 6 (November 13, 2017): 1331–36. http://dx.doi.org/10.1108/ijlma-07-2017-0160.
Повний текст джерелаAl-Fandi, Audai. "Symmetric Volatile Shared Key Encryption: A Two-way Communication Shared Key Encryption." Mathematics and Computer Science 2, no. 3 (2017): 27. http://dx.doi.org/10.11648/j.mcs.20170203.11.
Повний текст джерелаBaker, Monya. "Repositories share key research tools." Nature 505, no. 7483 (January 2014): 272. http://dx.doi.org/10.1038/505272a.
Повний текст джерелаB. Melo, Nicholas, and Tetsuyou Watanabe. "Key Posture Extraction from Object Manipulations Experiments." Advanced Engineering Forum 2-3 (December 2011): 308–13. http://dx.doi.org/10.4028/www.scientific.net/aef.2-3.308.
Повний текст джерелаCai, Binbin, Gongde Guo, and Song Lin. "Multi-party quantum key agreement with teleportation." Modern Physics Letters B 31, no. 10 (April 10, 2017): 1750102. http://dx.doi.org/10.1142/s0217984917501020.
Повний текст джерелаShim, Kyungah. "Unknown key-share attack on authenticated multiple-key agreement protocol." Electronics Letters 39, no. 1 (2003): 38. http://dx.doi.org/10.1049/el:20030076.
Повний текст джерелаLin, Jen-Chiun, Kuo-Hsuan Huang, Feipei Lai, and Hung-Chang Lee. "Secure and efficient group key management with shared key derivation." Computer Standards & Interfaces 31, no. 1 (January 2009): 192–208. http://dx.doi.org/10.1016/j.csi.2007.11.005.
Повний текст джерелаLevin, Aaron. "Successful ACT Programs Share Key Elements." Psychiatric News 47, no. 11 (June 2012): 9–28. http://dx.doi.org/10.1176/pn.47.11.psychnews_47_11_9-a.
Повний текст джерелаBadra, M., and I. Hajjeh. "Key-Exchange Authentication Using Shared Secrets." Computer 39, no. 3 (March 2006): 58–66. http://dx.doi.org/10.1109/mc.2006.94.
Повний текст джерелаHe, Mingxing, Pingzhi Fan, and Xiaoqiang Zhang. "k-Party shared RSA key generation." Journal of Electronics (China) 20, no. 1 (January 2003): 51–56. http://dx.doi.org/10.1007/s11767-003-0087-6.
Повний текст джерелаZaverucha, Gregory M., and Douglas R. Stinson. "Anonymity in shared symmetric key primitives." Designs, Codes and Cryptography 57, no. 2 (January 20, 2010): 139–60. http://dx.doi.org/10.1007/s10623-009-9357-0.
Повний текст джерелаAldaghri, Nasser, and Hessam Mahdavifar. "Threshold-Secure Coding With Shared Key." IEEE Journal on Selected Areas in Information Theory 2, no. 1 (March 2021): 95–105. http://dx.doi.org/10.1109/jsait.2021.3053020.
Повний текст джерелаYANG, CHUN-WEI, and TZONELIH HWANG. "EFFICIENT KEY CONSTRUCTION ON SEMI-QUANTUM SECRET SHARING PROTOCOLS." International Journal of Quantum Information 11, no. 05 (August 2013): 1350052. http://dx.doi.org/10.1142/s0219749913500524.
Повний текст джерелаSchadler, Cornelia, Irene Rieder, Eva-Maria Schmidt, Ulrike Zartler, and Rudolf Richter. "Key practices of equality within long parental leaves." Journal of European Social Policy 27, no. 3 (January 17, 2017): 247–59. http://dx.doi.org/10.1177/0958928716685688.
Повний текст джерелаVasim Ahamad, Mohd, Misbah Urrahman Siddiqui, Maria Masroor, and Urooj Fatima. "An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key." International Journal of Engineering & Technology 7, no. 4.5 (September 22, 2018): 347. http://dx.doi.org/10.14419/ijet.v7i4.5.20104.
Повний текст джерелаKaliski, Burton S. "An unknown key-share attack on the MQV key agreement protocol." ACM Transactions on Information and System Security 4, no. 3 (August 2001): 275–88. http://dx.doi.org/10.1145/501978.501981.
Повний текст джерелаS, Mohanavalli, and Gori Mohamed J. "Private Key Management for Data Transfer with Shared Random Secret Key." International Journal of Computer Science and Engineering 3, no. 4 (April 25, 2016): 89–93. http://dx.doi.org/10.14445/23488387/ijcse-v3i4p119.
Повний текст джерелаAbdel Hakeem, Shimaa A., and HyungWon Kim. "Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication." Sensors 22, no. 1 (January 3, 2022): 331. http://dx.doi.org/10.3390/s22010331.
Повний текст джерелаMorrison, Colin. "Active Share: Key Insight or Flawed Measure?" CFA Institute Conference Proceedings Quarterly 33, no. 1 (January 2016): 42–48. http://dx.doi.org/10.2469/cp.v33.n1.5.
Повний текст джерелаEl-Awady, Nadia. "Shared knowledge is key to a kingdom." Nature 532, no. 7600 (April 2016): S16—S18. http://dx.doi.org/10.1038/532s16a.
Повний текст джерелаBob and S. Sudharsanan. "Shared key encryption of jpeg color images." IEEE Transactions on Consumer Electronics 51, no. 4 (November 2005): 1204–11. http://dx.doi.org/10.1109/tce.2005.1561845.
Повний текст джерелаGreenaway, Katharine H., Ruth G. Wright, Joanne Willingham, Katherine J. Reynolds, and S. Alexander Haslam. "Shared Identity Is Key to Effective Communication." Personality and Social Psychology Bulletin 41, no. 2 (November 21, 2014): 171–82. http://dx.doi.org/10.1177/0146167214559709.
Повний текст джерелаBiondi, Fabrizio, Thomas Given-Wilson, and Axel Legay. "Attainable unconditional security for shared-key cryptosystems." Information Sciences 369 (November 2016): 80–99. http://dx.doi.org/10.1016/j.ins.2016.06.019.
Повний текст джерелаEggert, Andreas, and Wolfgang Ulaga. "Managing customer share in key supplier relationships." Industrial Marketing Management 39, no. 8 (November 2010): 1346–55. http://dx.doi.org/10.1016/j.indmarman.2010.03.003.
Повний текст джерелаSamuel, Ajiri Peter, and Hillary O. Odor. "Knowledge Sharing: A Key Role in the Knowledge Management Process." International Journal of Business and Management Research 6, no. 2 (June 30, 2018): 36–40. http://dx.doi.org/10.37391/ijbmr.060204.
Повний текст джерелаZhou, Hong-Sheng, Lei Fan, and Jian-Hua Li. "Remarks on unknown key-share attack on authenticated multiple-key agreement protocol." Electronics Letters 39, no. 17 (2003): 1248. http://dx.doi.org/10.1049/el:20030804.
Повний текст джерелаViirret, Tuija Leena. "Shared experiencing, shared understandings: Intersubjectivity as a key phenomenon in drama education." Applied Theatre Research 6, no. 2 (November 1, 2018): 155–66. http://dx.doi.org/10.1386/atr.6.2.155_1.
Повний текст джерелаYoshida, Masakazu, Ayumu Nakayama, and Jun Cheng. "Distinguishability and Disturbance in the Quantum Key Distribution Protocol Using the Mean Multi-Kings’ Problem." Entropy 22, no. 11 (November 11, 2020): 1275. http://dx.doi.org/10.3390/e22111275.
Повний текст джерелаCorbett, Katharine T., and Howard S. (Dick) Miller. "A Shared Inquiry into Shared Inquiry." Public Historian 28, no. 1 (2006): 15–38. http://dx.doi.org/10.1525/tph.2006.28.1.15.
Повний текст джерелаPearce, Craig L., Christina L. Wassenaar, and Charles C. Manz. "Is Shared Leadership the Key to Responsible Leadership?" Academy of Management Perspectives 28, no. 3 (August 2014): 275–88. http://dx.doi.org/10.5465/amp.2014.0017.
Повний текст джерелаLee, Sonia, Andy Henwood, Tania Barnes, and Martin Wilkie. "Is collaboration the key to shared haemodialysis care?" Journal of Kidney Care 3, no. 6 (November 2, 2018): 388–89. http://dx.doi.org/10.12968/jokc.2018.3.6.388.
Повний текст джерелаBejou, David, and Azam Bejou. "Shared Governance: The Key to Higher Education Equilibrium." Journal of Relationship Marketing 15, no. 1-2 (April 2, 2016): 54–61. http://dx.doi.org/10.1080/15332667.2015.1091630.
Повний текст джерелаKIM, AJUNG. "METHODS OF SHARED KEY AGREEMENT IN COHERENT MULTIPLEXING." Modern Physics Letters B 18, no. 16 (July 10, 2004): 833–39. http://dx.doi.org/10.1142/s0217984904007384.
Повний текст джерелаSwarnkar, Mayank. "Transaction Security Using Input Based Shared Key Cryptography." IOSR Journal of Computer Engineering 7, no. 5 (2012): 55–60. http://dx.doi.org/10.9790/0661-0755560.
Повний текст джерелаFigueiredo, Alcidio Silva, and Luisa Helena Pinto. "Robotizing shared service centres: key challenges and outcomes." Journal of Service Theory and Practice 31, no. 1 (December 4, 2020): 157–78. http://dx.doi.org/10.1108/jstp-06-2020-0126.
Повний текст джерелаZhou, Jian, and Xian-wei Zhou. "Autonomous Shared Key Management Scheme for Space Networks." Wireless Personal Communications 72, no. 4 (April 3, 2013): 2425–43. http://dx.doi.org/10.1007/s11277-013-1156-2.
Повний текст джерелаTurle, Marcus. "Shared services: An outline of key contractual issues." Computer Law & Security Review 26, no. 2 (March 2010): 178–84. http://dx.doi.org/10.1016/j.clsr.2010.01.009.
Повний текст джерелаRahman, Rezaur, and Hossen Asiful Mustafa. "Securing IPv6 Neighbor Discovery using Pre-Shared Key." Advances in Science, Technology and Engineering Systems Journal 6, no. 2 (March 2021): 722–32. http://dx.doi.org/10.25046/aj060284.
Повний текст джерелаKezar, Adrianna. "Creating a diverse student success infrastructure: The key to serving today’s student body and catalyzing cultural change." International Journal of Chinese Education 10, no. 1 (April 20, 2021): 221258682110062. http://dx.doi.org/10.1177/22125868211006204.
Повний текст джерелаKr. Naskar, Prabir, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, and Atal Chaudhuri. "Shared Cryptography with Embedded Session Key for Secret Audio." International Journal of Computer Applications 26, no. 8 (July 31, 2011): 5–9. http://dx.doi.org/10.5120/3128-4305.
Повний текст джерелаChakraborty, Kalyan, and Jay Mehta. "Preventing Unknown Key-Share Attack using Cryptographic Bilinear Maps." Journal of Discrete Mathematical Sciences and Cryptography 17, no. 2 (March 4, 2014): 135–47. http://dx.doi.org/10.1080/09720529.2013.842035.
Повний текст джерелаWang, Haowei, Xiaofeng Tao, Na Li, and Zhu Han. "Polar Coding for the Wiretap Channel With Shared Key." IEEE Transactions on Information Forensics and Security 13, no. 6 (June 2018): 1351–60. http://dx.doi.org/10.1109/tifs.2017.2774499.
Повний текст джерелаShiell, Richard. "Sharp Trephines – The Key to Optimum Punch Graft Surgery." Facial Plastic Surgery 2, no. 03 (January 1985): 231–33. http://dx.doi.org/10.1055/s-0028-1085279.
Повний текст джерелаSalzberg, Steven, Elodie Ghedin, and David Spiro. "Shared data are key to beating threat from flu." Nature 440, no. 7084 (March 2006): 605. http://dx.doi.org/10.1038/440605a.
Повний текст джерелаLu, Youjing, Fan Wu, Qianyi Huang, Shaojie Tang, Linghe Kong, and Guihai Chen. "Shared Secret Key Generation by Exploiting Inaudible Acoustic Channels." ACM Transactions on Sensor Networks 18, no. 1 (February 28, 2022): 1–26. http://dx.doi.org/10.1145/3480461.
Повний текст джерелаLu, Youjing, Fan Wu, Qianyi Huang, Shaojie Tang, Linghe Kong, and Guihai Chen. "Shared Secret Key Generation by Exploiting Inaudible Acoustic Channels." ACM Transactions on Sensor Networks 18, no. 1 (February 28, 2022): 1–26. http://dx.doi.org/10.1145/3480461.
Повний текст джерела