Academic literature on the topic 'Key usage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Key usage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Key usage"
Gryczka, Marcin. "ICT usage as a key prerequisite for open knowledge environment creation." Business and Economic Horizons 10, no. 4 (2014): 348–56. http://dx.doi.org/10.15208/beh.2014.26.
Full textPillon, Gregory. "OLP: the key to expanding robot usage." Industrial Robot: An International Journal 15, no. 4 (1988): 206–10. http://dx.doi.org/10.1108/eb005030.
Full textGläser, Carolin. "Acceptance and usage of BBS – possible key factors." Proceedings of Mechanical Engineering Congress, Japan 2022 (2022): S171–03. http://dx.doi.org/10.1299/jsmemecj.2022.s171-03.
Full textHwang, Gyusun, Juhyung Park, Jeongcheol Lee, Jinwoo Park, Tai-Woo Chang, and Joongyeon Won. "Analysis of IoT Usage in Korean Key Manufacturing Industries." Journal of Society for e-Business Studies 21, no. 4 (2016): 81–93. http://dx.doi.org/10.7838/jsebs.2016.21.4.081.
Full textMesmar, A., C. Maskineh, and R. V. Becker. "PHP153 - KEY STAKEHOLDERS PERCEPTIONS OF HEOR USAGE IN LEBANON." Value in Health 21 (October 2018): S176. http://dx.doi.org/10.1016/j.jval.2018.09.1047.
Full textRombouts, Ellen, Bea Maes, and Inge Zink. "Attitude and key word signing usage in support staff." Research in Developmental Disabilities 55 (August 2016): 77–87. http://dx.doi.org/10.1016/j.ridd.2016.03.016.
Full textYoke, Mary M., Susan E. Middlestadt, David K. Lohrmann, Andrea K. Chomistek, and Carol A. Kennedy-Armbruster. "Perceived Behavioral Control is Key for Activity Tracker Usage." Medicine & Science in Sports & Exercise 50, no. 5S (2018): 328–29. http://dx.doi.org/10.1249/01.mss.0000536162.40497.83.
Full textSylvestre, Sebastian, and Doerthe Andreae. "Identification Is Key: Barriers To Regular Usage Of Allergy Identifiers." Journal of Allergy and Clinical Immunology 147, no. 2 (2021): AB103. http://dx.doi.org/10.1016/j.jaci.2020.12.385.
Full textLohan, Anjana. "Key perspectives of yoga and usage patterns in assorted religions." Asian Journal of Multidimensional Research 10, no. 9 (2021): 80–88. http://dx.doi.org/10.5958/2278-4853.2021.00697.2.
Full textJabali, A. Karim, Khalid Yousuf Farid, Abdel-aziz Matani, and Fatma Al Mulhim. "Key Factors Influencing the Usage of MRI in Saudi Arabia." Procedia Computer Science 65 (2015): 562–71. http://dx.doi.org/10.1016/j.procs.2015.09.131.
Full textDissertations / Theses on the topic "Key usage"
Thangavel, Jayakumar. "Digital Signature : Comparative study of its usage in developed and developing countries." Thesis, Uppsala universitet, Informationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-217960.
Full textHarris, Ainslie J. "A model of key characteristics affecting consumer attitudes toward the usage of free legitimate ad-supported music download services." Thesis, Robert Gordon University, 2013. http://hdl.handle.net/10059/846.
Full textAziz, Najibullah. "Smart Devices as U-Learning Tools: Key Factors Influencing Users’ Intention." Thesis, Stockholms universitet, Management & Organisation, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-118603.
Full textHaagman, Jenny. "Knowledge is the Key : Internet access, utilization and opinions in Grenada, West Indies." Thesis, Jönköping University, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-763.
Full textTRIMECHE, OMAR. "Destination branding in the Middle-East & North Africa region: An exploration of the usage of social media by key internal stakeholders." Kyoto University, 2013. http://hdl.handle.net/2433/174867.
Full textJansson, Samuel. "Evaluation of KPIs and Battery Usage of Li-ion BESS for FCR Application." Thesis, Uppsala universitet, Elektricitetslära, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-394015.
Full textAlmeida, Leonardo de Campos. "Lyra: uma função de derivação de chaves com custos de memória e processamento configuráveis." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-29062016-085500/.
Full textHitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.
Full textHitchcock, Yvonne Roslyn. "Elliptic Curve Cryptography for Lightweight Applications." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15838/.
Full textCokal, Derya. "A Contrastive Analysis Of The Pronominal Usages Of This And That In Academic Written Discourse." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/2/12606268/index.pdf.
Full textBooks on the topic "Key usage"
G, Eisenberg Myron, ed. Key words in psychosocial rehabilitation: A guide to contemporary usage. Springer Pub. Co., 1994.
Find full textShirley, Cammack, and Eisenberg Myron G, eds. Key words in physical rehabilitation: A guide to contemporary usage. Springer Pub. Co., 1995.
Find full textKapp, Marshall B. Key words in ethics, law, and aging: A guide to contemporary usage. Springer Pub. Co., 1995.
Find full textTomomatsu, Etsuko. 200 essential Japanese expressions: A guide to correct usage of key sentence patterns. ALC Press, 2000.
Find full textL, Denis, ed. Antiandrogens in prostate cancer: A key to tailored endocrine treatment. Springer, 1996.
Find full textCampbell, Shirley. Talking about writing.: A sequential programme of sentence structure, grammar, usage and punctuation for grade 9 : with accompanying answer key. Trafford, 1999.
Find full textCampbell, Shirley. Talking about writing.: A sequential programme of sentence structure, grammar, usage and punctuation for grade 8 : with accompanying answer key. Trafford, 1999.
Find full textCampbell, Shirley. Talking about writing.: A sequential programme of sentence structure, grammar, usage and punctuation for grade 10 : with accompanying answer key. Trafford, 1999.
Find full textCampbell, Shirley. Talking about writing.: A sequential programme of sentence structure, grammar, usage and punctuation for grade 12 : with accompanying answer key. Trafford, 1999.
Find full textBook chapters on the topic "Key usage"
Bechlaghem, Malek, and Vincent Rijmen. "Proving Key Usage." In Information Security Applications. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31815-6_6.
Full textHaunts, Stephen. "Azure Key Vault Usage Patterns." In Applied Cryptography in .NET and Azure Key Vault. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4375-6_11.
Full textMcGrath, Stephen Keith. "Key Difficulties of Language Usage." In Speaking Management. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2213-7_3.
Full textToncich, Dario. "Introduction and Text Usage Guide." In Key Factors in Postgraduate Research Supervision A Guide for Supervisors. River Publishers, 2022. http://dx.doi.org/10.1201/9781003338741-2.
Full textLee, Kwanwoo, and Kyo C. Kang. "Usage Context as Key Driver for Feature Selection." In Software Product Lines: Going Beyond. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15579-6_3.
Full textCruz, Francisco, Francisco Maia, Miguel Matos, et al. "Resource Usage Prediction in Distributed Key-Value Datastores." In Distributed Applications and Interoperable Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39577-7_12.
Full textChen, Liqian, Renjie Huang, Dan Luo, Chenghu Ma, Dengping Wei, and Ji Wang. "Estimating Worst-case Resource Usage by Resource-usage-aware Fuzzing." In Fundamental Approaches to Software Engineering. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99429-7_5.
Full textPark, JaeSung, JaeJon Kim, and Joon Koh. "Key Factors Affecting Continuous Usage Intention in Web Analytics Service." In Agent and Multi-Agent Systems: Technologies and Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01665-3_53.
Full textJanols, Rebecka, Bengt Göransson, Erik Borälv, and Bengt Sandblad. "Physicians’ Concept of Time Usage – A Key Concern in EPR Deployment." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15515-4_8.
Full textArcher, Dawn, and Jonathan Culpeper. "Identifying key sociophilological usage in plays and trial proceedings (1640-1760)." In Benjamins Current Topics. John Benjamins Publishing Company, 2011. http://dx.doi.org/10.1075/bct.31.06arc.
Full textConference papers on the topic "Key usage"
Zhang, Shuyi, Jiakun Zhang, and Yongkun Li. "Fine-Grained Dynamic Hardware Resource Usage Measurement for Distributed Key-Value Stores." In 2025 10th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA). IEEE, 2025. https://doi.org/10.1109/icccbda64898.2025.11030438.
Full textBeale, Raymond, Paul Swindell, and Mark Davis. "Achieving Usage Based Maintenance with HUMS Regime Recognition." In Vertical Flight Society 71st Annual Forum & Technology Display. The Vertical Flight Society, 2015. http://dx.doi.org/10.4050/f-0071-2015-10186.
Full textKelly, Stacey. "V-22 Dynamic Components Fatigue Design Usage Spectrum vs. Fleet History." In Vertical Flight Society 70th Annual Forum & Technology Display. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9544.
Full textJ., Raymond, Jeff Finckenor, Jared Kloda, et al. "Analysis Of UH-60 L/M Black Hawk Fleet Usage In Support Of A Partial Usage Spectrum Update." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12772.
Full textLeFevre, Brian, Conor Marr, David Rusk, Mark Davis, and Courtney Johnson. "Integrated Hybrid Structural Management System (IHSMS) - Usage and Loads Monitoring." In Vertical Flight Society 73rd Annual Forum & Technology Display. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12087.
Full textHull, Jason, Mark Davis, Roberto Semidey, Jeffrey Monaco, Raymond Beale, and Mark Glucksman-Glaser. "Regime Recognition Accuracy." In Vertical Flight Society 73rd Annual Forum & Technology Display. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12076.
Full textGreen, David, Harrison Chin, and Richard Barnett. "Assessment of Processes and Risks Associated with Extension of Inspection Intervals." In Vertical Flight Society 73rd Annual Forum & Technology Display. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12216.
Full textMonaco, Jeffrey, Mark Davis, Roberto Semidey, Jason Hull, Raymond Beale, and Mark Glucksman-Glaser. "Maneuver Generation for Regime Recognition Design and Validation." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12771.
Full textMulroy, Michael, Nick Lieven, Peter Morrish, et al. "The Application of Helicopter Health and Usage Monitoring Techniques within the Wind Turbine Industry." In Vertical Flight Society 70th Annual Forum & Technology Display. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9693.
Full textMechouche, Ammar, Pierre-Loïc Maisonneuve, Matthis Houles, and Caroline Del cistia Gallimard. "On the Trustworthiness of Machine Learning Models in Health and Usage Monitoring of In-Service Helicopters." In Vertical Flight Society 81st Annual Forum and Technology Display. The Vertical Flight Society, 2025. https://doi.org/10.4050/f-0081-2025-88.
Full textReports on the topic "Key usage"
Housley, R., J. Hoyland, M. Sethi, and C. A. Wood. Guidance for External Pre-Shared Key (PSK) Usage in TLS. RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9257.
Full textKitterman, S. Cryptographic Algorithm and Key Usage Update to DomainKeys Identified Mail (DKIM). RFC Editor, 2018. http://dx.doi.org/10.17487/rfc8301.
Full textReddy.K, T., J. Ekman, and D. Migault. X.509 Certificate Extended Key Usage (EKU) for 5G Network Functions. RFC Editor, 2024. http://dx.doi.org/10.17487/rfc9509.
Full textMahy, R. X.509 Certificate Extended Key Usage (EKU) for Instant Messaging URIs. RFC Editor, 2025. https://doi.org/10.17487/rfc9734.
Full textLawrence, S., and V. Gurbani. Extended Key Usage (EKU) for Session Initiation Protocol (SIP) X.509 Certificates. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5924.
Full textIto, T., T. Okubo, and S. Turner. X.509 Certificate General-Purpose Extended Key Usage (EKU) for Document Signing. RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9336.
Full textBrockhaus, H., and D. Goltzsche. X.509 Certificate Extended Key Usage (EKU) for Configuration, Updates, and Safety-Critical Communication. RFC Editor, 2025. https://doi.org/10.17487/rfc9809.
Full textNir, Y., T. Kivinen, P. Wouters, and D. Migault. Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2). RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8247.
Full textDevane, Katie, Allan Kelly, and Rachel Slaymaker. Profiling short-term let usage across Ireland. ESRI, 2024. https://doi.org/10.26504/rs208.
Full textNagle, Frank, Kate Powell, Richie Zitomer, and David A. Wheeler. Census III of Free and Open Source Software: Application Libraries. The Linux Foundation, 2024. https://doi.org/10.70828/jrpb8299.
Full text