Academic literature on the topic 'Hashek'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hashek.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Hashek"
Steinebach, Martin. "A Close Look at Robust Hash Flip Positions." Electronic Imaging 2021, no. 4 (2021): 345–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.4.mwsf-345.
Full textTetreault, Chantal. "“What do you think about having beauty marks on your-Hashek !”: Innovative and Impolite Uses of an Arabic Politeness Formula among French Teenagers." Journal of Linguistic Anthropology 25, no. 3 (2015): 285–302. http://dx.doi.org/10.1111/jola.12098.
Full textQuilala, Rogel Ladia, Ariel M. Sison, and Ruji P. Medina. "Modified SHA-1 Algorithm." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 3 (2018): 1027. http://dx.doi.org/10.11591/ijeecs.v11.i3.pp1027-1034.
Full textRogel, L. Quilala, M. Sison Ariel, and P. Medina Ruji. "Modified SHA-1 Algorithm." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 3 (2018): 1027–34. https://doi.org/10.11591/ijeecs.v11.i3.pp1027-1034.
Full textMERMUTLU, MEHMET BEDRI, and MASOUMEH EKHTIARI CHAROYMAGHI. "Handwritten poems of the 16th century Iranian poet of the Ottoman court Hashem (Hashmi) Ajam." A Journal of Iranology Studies 1, no. 18 (2023): 1–14. http://dx.doi.org/10.5152/ajis.2023.220716.
Full textHadjieleftheriou, Marios, Xiaohui Yu, Nick Koudas, and Divesh Srivastava. "Hashed samples." Proceedings of the VLDB Endowment 1, no. 1 (2008): 201–12. http://dx.doi.org/10.14778/1453856.1453883.
Full textGutmann, P., D. Naccache, and C. C. Palmer. "When Hashes Collide." IEEE Security and Privacy Magazine 3, no. 3 (2005): 68–71. http://dx.doi.org/10.1109/msp.2005.84.
Full textRosenthal, Gilbert S. "Two Sides of One Coin: Hillul Hashem and Kiddush Hashem." Journal of Ecumenical Studies 55, no. 3 (2020): 415–36. http://dx.doi.org/10.1353/ecu.2020.0035.
Full textMarletta, Daniele, Alessandro Midolo, and Emiliano Tramontana. "A Blockchain-Based Strategy for Certifying Timestamps in a Distributed Healthcare Emergency Response Systems." Future Internet 17, no. 5 (2025): 210. https://doi.org/10.3390/fi17050210.
Full textKonovalov, V. A. "A METHOD FOR SYNTHESIZING TOPOS OF HASHES IN THE CATEGORICAL cN-SCHEME OF THE MARKOV ALGORITHM. Part 2." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 243 (September 2024): 40–51. https://doi.org/10.14489/vkit.2024.09.pp.040-051.
Full textDissertations / Theses on the topic "Hashek"
Almakrami, Hashem Abdullah A. "Online self-disclosure across cultures: A study of Facebook use in Saudi Arabia and Australia." Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/84494/4/Hashem%20Almakrami%20Thesis.pdf.
Full textDhoopa, Harish Priyanka. "Towards Designing Energy-Efficient Secure Hashes." UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/598.
Full textRogozinsky, Shayna. "Luzzatto's Derech Hashem: understanding the way of God." Thesis, McGill University, 2011. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=97093.
Full textAlmeida, Carlos Emanuel Guedes. "Análise comparativa de hastes longas vs hastes curtas na artroplastia da anca." Master's thesis, Universidade de Aveiro, 2018. http://hdl.handle.net/10773/23695.
Full textStultz, Jacob A. "Optimizing live virtual machine migrations using content-based page hashes." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/46499.
Full textDuflot, Roland. "Iulia Hasdeu : légendes et réalités." Université de Provence. Faculté des lettres et sciences humaines (1969-2011), 1999. http://www.theses.fr/1999AIX10086.
Full textZullo, Douglas R. "Jiri Kolar in Exile: Ubiety and Identity in Two Views of Prague." Columbus, Ohio : Ohio State University, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1132666987.
Full textShorafa, Hashem [Verfasser]. "Strukturchemie von Osmiumverbindungen in den Oxidationsstufen (VII & VI) und Hexafluorobenzolradikalkation / Hashem Shorafa." Berlin : Freie Universität Berlin, 2009. http://d-nb.info/1023622823/34.
Full textAlkhaldi, Hashem [Verfasser]. "Contact Investigations of Granular Mechanical Media in a Tumbling Sorting Machine / Hashem Alkhaldi." Aachen : Shaker, 2007. http://d-nb.info/116651109X/34.
Full textLIMA, José Paulo da Silva. "Validação de dados através de hashes criptográficos: uma avaliação na perícia forense computacional brasileira." Universidade Federal de Pernambuco, 2015. https://repositorio.ufpe.br/handle/123456789/15966.
Full textBooks on the topic "Hashek"
Fridman, Sheraga Fayṿl. Living kiddush Hashem: Sanctifying Hashem in everything we do. Mesorah Publications, 2014.
Find full textKhāna, Hāśema. Hāśema Khāna =: Hashem Khan. Bāṃlādeśa Śilpakalā Ekāḍemī, 1992.
Find full textill, Ariʼel Liʼat Binyamini, ed. Where are you, Hashem? Mesorah Publications, 1994.
Find full textNusairi, Sara El. Hashem El Madani: Studio practices. Arab Image Foundation, 2004.
Find full textBook chapters on the topic "Hashek"
Capello, Maria Angela, and Hosnia S. Hashim. "Hashem S. Hashim." In Learned in the Trenches. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62822-6_2.
Full textClements, Matt. "Hashes." In Ruby Quick Syntax Reference. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6569-6_5.
Full textLee, James, Simon Cozens, and Peter Wainwright. "Hashes." In Beginning Perl. Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0665-1_5.
Full textEasttom, William. "Cryptographic Hashes." In Modern Cryptography. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63115-4_9.
Full textEasttom, Chuck. "Cryptographic Hashes." In Modern Cryptography. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12304-7_9.
Full textSinha, Sanjib. "Hashes and Passwords." In Beginning Ethical Hacking with Kali Linux. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3891-2_13.
Full textGooch, Jan W. "Hashab." In Encyclopedic Dictionary of Polymers. Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-6247-8_5809.
Full textGunsing, Aldo, and Bart Mennink. "Collapseability of Tree Hashes." In Post-Quantum Cryptography. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44223-1_28.
Full textRothwell, William “Bo.” "Advanced Data Types: Hashes." In Advanced Perl Programming. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5863-7_4.
Full textMantione, Massimiliano, and Fred Chow. "Hashed SSA Form: HSSA." In SSA-based Compiler Design. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80515-9_16.
Full textConference papers on the topic "Hashek"
Kwon, Osang, Yongho Lee, Junhyeok Park, Sungbin Jang, Byungchul Tak, and Seokin Hong. "Distributed Page Table: Harnessing Physical Memory as an Unbounded Hashed Page Table." In 2024 57th IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 2024. https://doi.org/10.1109/micro61859.2024.00013.
Full textSchardong, Frederico, and Daniel Formolo. "A Non-Probabilistic Time-Storage Trade-off for Unsalted Hashes." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2016. http://dx.doi.org/10.5753/sbseg.2016.19308.
Full textRibeiro, Jorge Miguel, Daniel Macêdo Batista, and José Coelho de Pina. "hashify: Uma Ferramenta para Visualização de Hashes com Animações." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg_estendido.2020.19277.
Full textSitnikova, L. K., M. O. Elantcev, and R. O. Sultanov. "A two-step method of searching for similar images in a large image database." In 2022 33th All-Russian Youth Exhibition of Innovations. Publishing House of Kalashnikov ISTU, 2022. http://dx.doi.org/10.22213/ie022143.
Full textStolz, Peter, Sebastian Roth, and Ben Stock. "To hash or not to hash: A security assessment of CSP’s unsafe-hashes expression." In 2022 IEEE Security and Privacy Workshops (SPW). IEEE, 2022. http://dx.doi.org/10.1109/spw54247.2022.9833888.
Full textCao, Zhangjie, Mingsheng Long, Jianmin Wang, and Philip S. Yu. "HashNet: Deep Learning to Hash by Continuation." In 2017 IEEE International Conference on Computer Vision (ICCV). IEEE, 2017. http://dx.doi.org/10.1109/iccv.2017.598.
Full textSato, Jessica Yumi Nakano, Jorge Miguel Ribeiro, Roberto Samarone Araujo, José Coelho de Pina, and Daniel Macêdo Batista. "Utilização de Animações para Comparação de Hashes em Votação Eletrônica via Internet." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbseg_estendido.2022.224854.
Full textJohn, Binoy, Aakash Kumar Singh, and C. Sabarinathan. "Voter Verification in an Election Using Merkle Tree." In International Research Conference on IOT, Cloud and Data Science. Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-9fnk16.
Full textWyman, Chris, and Morgan McGuire. "Hashed alpha testing." In I3D '17: Symposium on Interactive 3D Graphics and Games. ACM, 2017. http://dx.doi.org/10.1145/3023368.3023370.
Full textSteinebach, Martin, Sebastian Lutz, and Huajian Liu. "Privacy and Robust Hashes." In ARES '19: 14th International Conference on Availability, Reliability and Security. ACM, 2019. http://dx.doi.org/10.1145/3339252.3340105.
Full textReports on the topic "Hashek"
Eastlake, D. HMAC SHA (Hashed Message Authentication Code, Secure Hash Algorithm) TSIG Algorithm Identifiers. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4635.
Full textFarrell, S., D. Kutscher, C. Dannewitz, B. Ohlman, A. Keranen, and P. Hallam-Baker. Naming Things with Hashes. RFC Editor, 2013. http://dx.doi.org/10.17487/rfc6920.
Full textBryan, A., N. McNab, T. Tsujikawa, P. Poeml, and H. Nordstrom. Metalink/HTTP: Mirrors and Hashes. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6249.
Full textHoffman, P., and B. Schneier. Attacks on Cryptographic Hashes in Internet Protocols. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4270.
Full textLaurie, B., G. Sisson, R. Arends, and D. Blacka. DNS Security (DNSSEC) Hashed Authenticated Denial of Existence. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5155.
Full textOvsienko, D. Babel Hashed Message Authentication Code (HMAC) Cryptographic Authentication. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7298.
Full textVelvindron, L., K. Moriarty, and A. Ghedini. Deprecating MD5 and SHA-1 Signature Hashes in TLS 1.2 and DTLS 1.2. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc9155.
Full textDang, Quynh H. Secure Hash Standard. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.fips.180-4.
Full textBrewer, Mike. Reforming welfare: less haste, more detail please. The IFS, 2010. http://dx.doi.org/10.1920/co.ifs.2024.0949.
Full textJones, Marcus, and Nick E. Christians. Evaluation of an Amino Acid Biostimulant to Hasten Turfgrass Recovery. Iowa State University, Digital Repository, 2012. http://dx.doi.org/10.31274/farmprogressreports-180814-414.
Full text