Academic literature on the topic 'Symmetry key'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Symmetry key.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Symmetry key"

1

Elliott, J. P. "Key to symmetry." Nature 313, no. 6001 (1985): 409. http://dx.doi.org/10.1038/313409b0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Skinner, Mhairi. "Symmetry is key." Nature Reviews Cancer 9, no. 11 (2009): 769. http://dx.doi.org/10.1038/nrc2757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Chunbiao, Jiayu Sun, Tianai Lu, and Tengfei Lei. "Symmetry Evolution in Chaotic System." Symmetry 12, no. 4 (2020): 574. http://dx.doi.org/10.3390/sym12040574.

Full text
Abstract:
A comprehensive exploration of symmetry and conditional symmetry is made from the evolution of symmetry. Unlike other chaotic systems of conditional symmetry, in this work it is derived from the symmetric diffusionless Lorenz system. Transformation from symmetry and asymmetry to conditional symmetry is examined by constant planting and dimension growth, which proves that the offset boosting of some necessary variables is the key factor for reestablishing polarity balance in a dynamical system.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Hongjia, Junwen Huang, Xin Xu, Qiang Fang, and Yifei Shi. "Symmetry-Aware 6D Object Pose Estimation via Multitask Learning." Complexity 2020 (October 21, 2020): 1–7. http://dx.doi.org/10.1155/2020/8820500.

Full text
Abstract:
Although 6D object pose estimation has been intensively explored in the past decades, the performance is still not fully satisfactory, especially when it comes to symmetric objects. In this paper, we study the problem of 6D object pose estimation by leveraging the information of object symmetry. To this end, a network is proposed that predicts 6D object pose and object reflectional symmetry as well as the key points simultaneously via a multitask learning scheme. Consequently, the pose estimation is aware of and regulated by the symmetry axis and the key points of the to-be-estimated objects.
APA, Harvard, Vancouver, ISO, and other styles
5

Senjanović, Goran. "Is left–right symmetry the key?" Modern Physics Letters A 32, no. 04 (2017): 1730004. http://dx.doi.org/10.1142/s021773231730004x.

Full text
Abstract:
In collaboration with Jogesh Pati, Abdus Salam challenged the chiral gauge nature of the Standard Model by paving the road towards the left-right symmetric electro-weak theory. I describe here the logical and historical construction of this theory, by emphasising the pioneering and key role it played for neutrino mass. I show that it is a self-contained and predictive model with the Higgs origin of Majorana neutrino mass, in complete analogy with the SM situation regarding charged fermions.
APA, Harvard, Vancouver, ISO, and other styles
6

Mandal, Satyendra Nath, Subhankar Dutta, and Ritam Sarkar. "Block Based Symmetry Key Visual Cryptography." International Journal of Computer Network and Information Security 4, no. 9 (2012): 10–19. http://dx.doi.org/10.5815/ijcnis.2012.09.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

PIRANDOLA, STEFANO. "SYMMETRIC COLLECTIVE ATTACKS FOR THE EAVESDROPPING OF SYMMETRIC QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 06, supp01 (2008): 765–71. http://dx.doi.org/10.1142/s0219749908004080.

Full text
Abstract:
We consider the collective eavesdropping of the BB84 and six-state protocols. Since these protocols are symmetric in the eigenstates of conjugate bases, we consider collective attacks having the same kind of symmetry. We then show how these symmetric collective attacks are sufficiently strong in order to minimize the Devetak–Winter rates. In fact, it is quite easy to construct simple examples able to reach the unconditionally secure key rates of these protocols.
APA, Harvard, Vancouver, ISO, and other styles
8

Sievers, Silvan, Martin Wehrle, Malte Helmert, and Michael Katz. "Strengthening Canonical Pattern Databases with Structural Symmetries." Proceedings of the International Symposium on Combinatorial Search 8, no. 1 (2021): 91–99. http://dx.doi.org/10.1609/socs.v8i1.18429.

Full text
Abstract:
Symmetry-based state space pruning techniques have proved to greatly improve heuristic search based classical planners. Similarly, abstraction heuristics in general and pattern databases in particular are key ingredients of such planners. However, only little work has dealt with how the abstraction heuristics behave under symmetries. In this work, we investigate the symmetry properties of the popular canonical pattern databases heuristic. Exploiting structural symmetries, we strengthen the canonical pattern databases by adding symmetric pattern databases, making the resulting heuristic invaria
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Weijun, Guoliang Yang, Zhangyou Xiong, Xiaojuan Zhu, and Xinyu Ma. "A Traffic Flow Prediction Model Based on Dynamic Graph Convolution and Adaptive Spatial Feature Extraction." Symmetry 17, no. 7 (2025): 1007. https://doi.org/10.3390/sym17071007.

Full text
Abstract:
The inherent symmetry in traffic flow patterns plays a fundamental role in urban transportation systems. This study proposes a Dynamic Graph Convolutional Recurrent Adaptive Network (DGCRAN) for traffic flow prediction, leveraging symmetry principles in spatial–temporal dependencies. Unlike conventional models relying on static graph structures that often break real-world symmetry relationships, our approach introduces two key innovations respecting the dynamic symmetry of traffic networks: First, a Dynamic Graph Convolutional Recurrent Network (DGCRN) is proposed that preserves and adapts to
APA, Harvard, Vancouver, ISO, and other styles
10

Zheng Mingliang. "Disturbance Decoupling for a Class of Nonlinear Control Systems Based on Lie Symmetry Method." Journal of Electrical Systems 20, no. 3 (2024): 3650–61. https://doi.org/10.52783/jes.5252.

Full text
Abstract:
To fully explore the inherent structural properties of symmetric nonlinear control systems, this paper introduces the Lie symmetry method to the disturbance decoupling problem for a class of SISO nonlinear control systems. Firstly, the state-space equations and the disturbance decoupling model for a class of SISO nonlinear control systems are defined; Secondly, the key technologies and algorithm approaches of Lie symmetry theory for differential equations are introduced, and the conditions and the properties of Lie symmetry for nonlinear control systems under group action are given in detail;
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Symmetry key"

1

Reyes, Elisabeth. "Evolutionary history of floral key innovations in angiosperms." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLS489/document.

Full text
Abstract:
Les Angiospermes forment un clade connu pour sa grande diversité d’espèces et une répartition inégale de cette diversité en son sein. Ce travail se concentre sur la reconstruction d’états ancestraux de caractères floraux sur les phylogénies dans le but d’étudier leur impact sur la diversification. En premier lieu, nous nous sommes focalisés sur deux innovations-clés potentielles chez les Proteaceae, la symétrie bilatérale du périanthe et la présence dans les hotspots à climat méditerranéen. L’utilisation sur une phylogénie de modèles de diversification dépendants des états de caractère a permi
APA, Harvard, Vancouver, ISO, and other styles
2

Azam, Junaid. "Symmetric Key Management for Mobile Financial Applications : A Key Hierarchy Approach." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143634.

Full text
Abstract:
In recent times the usage of smart phones has significantly increased. Businesses are transforming to make more out of smart phones. As a consequence, there is an increasing demand to have more and more mobile applications. Among other areas, mobile applications are also being used to make financial transactions. Applications used for financial transactions need to be more reliable and have end-to-end security. To implement security we heavily depend on cryptography and the heart of cryptography is the keys which are used in cryptographic processes (encryption/decryption). Therefore, it is ess
APA, Harvard, Vancouver, ISO, and other styles
3

Talluri, Sai Raghu. "Towards Designing Energy Efficient Symmetric Key Protocols." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/853.

Full text
Abstract:
Energy consumption by various modern symmetric key encryption protocols (DES, 3-DES, AES and, Blowfish) is studied from an algorithmic perspective. The work is directed towards redesigning or modifying the underlying algorithms for these protocols to make them consume less energy than they currently do. This research takes the approach of reducing energy consumption by parallelizing the consecutive memory accesses of symmetric key encryption algorithms. To achieve parallelization, an existing energy complexity model is applied to symmetric key encryption algorithms. Inspired by the popular DDR
APA, Harvard, Vancouver, ISO, and other styles
4

Čanda, Valér. "Scalable symmetric block ciphers based on group bases." [S.l.] : [s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962789755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ghosh, Debeshi D. "Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10263604.

Full text
Abstract:
<p> Watermarking is the process of embedding information into a carrier signal such as audio, video, and images. It is widely used to protect proprietary information in the signal to prevent information theft or duplicity. In this project, an audio watermarking system with dual layer security has been implemented. The entire system is divided into two sections that are independent, but have been combined, to make a unique system that provides increased levels of robustness. The first part of the project involves encrypting an embedded image (watermark) using the XOR method of symmetric key cry
APA, Harvard, Vancouver, ISO, and other styles
6

Kamineni, Surya Bharat. "Experimental Analysis on the Feasibility of Voice Based Symmetric Key Generation for Embedded Devices." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6874.

Full text
Abstract:
In this thesis, we present results of an experimental study in order to generate a secure cryptographic key from the user’s voice which is to be shared between two mobile devices. We identified two security threats related to this problem, discussed the challenges to design the key generation/sharing mechanism, and proposed a new protocol based on bloom filters that overcomes the two main attacks by the intruder. One is when the attacker places its device in the close vicinity of the location where the user attempts to generate/share the key in order to derive the key from eavesdropping on com
APA, Harvard, Vancouver, ISO, and other styles
7

May, Lauren Jeanette. "Design, analysis and implementation of symmetric block ciphers." Thesis, Queensland University of Technology, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kasparek, Alexander J. "Secure Key Agreement for Wearable Medical Devices." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1333.

Full text
Abstract:
In this thesis we explore if a proposed random binary sequence generation algorithm can be combined with a separately proposed symmetric key agreement protocol to provide usable security for communications in Wireless Body Area Networks (WBAN). Other previous works in this area fall short by only considering key generation between two of the same signals or allowing for key generation between two different types of signals but with the cost of a significant signal collection time requirement. We hoped to advance this area of research by making secure key generation more efficient with less sig
APA, Harvard, Vancouver, ISO, and other styles
9

Henricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16055/1/Matt_Henricksen_Thesis.pdf.

Full text
Abstract:
The main objective of this thesis is to examine the trade-offs between security and efficiency within symmetric ciphers. This includes the influence that block ciphers have on the new generation of word-based stream ciphers. By incorporating block-cipher like components into their designs, word-based stream ciphers have experienced hundreds-fold improvement in speed over bit-based stream ciphers, without any observable security degradation. The thesis also emphasizes the importance of keying issues in block and stream ciphers, showing that by reusing components of the principal cipher alg
APA, Harvard, Vancouver, ISO, and other styles
10

Henricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16055/.

Full text
Abstract:
The main objective of this thesis is to examine the trade-offs between security and efficiency within symmetric ciphers. This includes the influence that block ciphers have on the new generation of word-based stream ciphers. By incorporating block-cipher like components into their designs, word-based stream ciphers have experienced hundreds-fold improvement in speed over bit-based stream ciphers, without any observable security degradation. The thesis also emphasizes the importance of keying issues in block and stream ciphers, showing that by reusing components of the principal cipher alg
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Symmetry key"

1

I, MacGregor William, and National Institute of Standards and Technology (U.S.), eds. Symmetric key injection onto smart cards. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Baksi, Anubhab. Classical and Physical Security of Symmetric Key Cryptographic Algorithms. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6522-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Workshop on Japan Linear Collider (JLC) (4th 1993 KEK). Proceedings of the Fourth Workshop on Japan Linear Collider (JLC): KEK, March 22-23, 1993. Edited by Kurihara Y and Kō-enerugī Butsurigaku Kenkyūjo (Japan). National Laboratory for High Energy Physics, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

International Symposium on Surface and Interface: Properties of Different Symmetry Crossing (2000 Nagoya-shi, Japan). ISSI PDSC-2000: International Symposium on Surface and Interface: Properties of Different Symmetry Crossing 2000, Aichi-ken Sangyo Boueki-kan, Nagoya, Japan, 17-20 October 2000. North-Holland, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

International Symposium on Surface and Interface: Properties of Different Symmetry Crossing (2000 Nagoya-shi, Japan). ISSI PDSC-2000: International Symposium on Surface and Interface: Properties of Different Symmetry Crossing 2000, Aichi-ken Sangyo Boueki-kan, Nagoya, Japan, 17-20 October 2000. North-Holland, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sarkar, Rumu. A Fearful Symmetry. Praeger, 2010. http://dx.doi.org/10.5040/9798216968054.

Full text
Abstract:
This title provides a new and original framework for analysis of global terrorism, with a view to understanding and resolving Islamic-based, fundamentalist jihadism. InA Fearful Symmetry: The New Soldier in the Age of Asymmetric ConflictProfessor Rumu Sarkar deploys a new set of analytical techniques to frame the phenomenon of global terrorism in a way that is both illuminating and fruitful in its practical applications for NATO, UN, and AU forces. With innovative conceptual tools developed in her essay, "Une Symétrie de la Peur," which was the Prix Fondation Saint-Cyr 2007 essay award winner,
APA, Harvard, Vancouver, ISO, and other styles
7

Moore, J. Key Curriculum Maths. KCP Publications Ltd., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moore, J. Key Curriculum Maths. KCP Publications Ltd., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Moore, J. Key Curriculum Maths. KCP Publications Ltd., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Moore, J. Key Curriculum Maths. KCP Publications Ltd., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Symmetry key"

1

Kim, Chang Boo, Young Chul Ahn, Bo Yeon Kim, Chong Du Cho, and Hyeon Gyu Beom. "Finite Element Analysis of Blower Impeller Using Cyclic Symmetry." In Key Engineering Materials. Trans Tech Publications Ltd., 2007. http://dx.doi.org/10.4028/0-87849-456-1.1082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hong, Kyung Min, Young June Kang, Nak Kyu Park, and Weon Jae Ryu. "A Study on the Vibration Characteristics of Symmetry and Asymmetry Laminated Composite Materials by Using ESPI." In Key Engineering Materials. Trans Tech Publications Ltd., 2007. http://dx.doi.org/10.4028/0-87849-456-1.2366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Yujie, Benying Tan, Shuxue Ding, Christian Desrosiers, and Ahmad Chaddad. "Symmetry Structured Analysis Sparse Coding for Key Frame Extraction." In Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20096-0_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jona-Lasinio, Giovanni. "Spontaneous Symmetry Breaking in Particle Physics." In Springer Proceedings in Physics. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-23042-4_17.

Full text
Abstract:
AbstractI will review the appearance of spontaneous symmetry breaking (SSB) in particle physics at the end of the fifties and beginning of the sixties of the XXth century. I will recall Heisenberg non-linear spinor theory and the genesis of the first model (NJL) of fermion mass generation developed in collaboration with Yoichiro Nambu, based on the idea of spontaneous symmetry breaking. Both the non-linear spinor theory and the NJL model are invariant under a chiral transformation ($$\gamma _5$$ γ 5 —invariance) which was introduced by Bruno Touschek in 1957 and named by Heisenberg the Tousche
APA, Harvard, Vancouver, ISO, and other styles
5

Vishio, Anton. "16. A Myth of Recurrence in Iannis Xenakis’s La Légende d’Eer." In Meta-Xenakis. Open Book Publishers, 2024. http://dx.doi.org/10.11647/obp.0390.18.

Full text
Abstract:
Xenakis’s La Légende d’Eer has received much analytical attention, detailing the life stages of its cosmic soundworld: its origin, flourishing, and eventual disintegration. Many analyses have suggested a kind of symmetry between the beginning and ending, as if the soundworld has returned to its initial state. In contrast, in this chapter I argue that the symmetry and any corresponding ideas about closure are ultimately illusory, that the intimations of the opening sounds in the closing minutes in fact highlight the tragic impossibility of ‘recurrence’. The work enacts this theme on a smaller s
APA, Harvard, Vancouver, ISO, and other styles
6

Sergeev, Alexander, Mikhail Sergeev, Nikolaj Balonin, and Anton Vostrikov. "Symmetry Indices as a Key to Finding Matrices of Cyclic Structure for Noise-Immune Coding." In Intelligent Decision Technologies. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5925-9_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Delfs, Hans, and Helmut Knebl. "Symmetric-Key Encryption." In Information Security and Cryptography. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-642-87126-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Delfs, Hans, and Helmut Knebl. "Symmetric-Key Encryption." In Information Security and Cryptography. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/3-540-49244-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Delfs, Hans, and Helmut Knebl. "Symmetric-Key Cryptography." In Information Security and Cryptography. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47974-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sniatala, Pawel, S. S. Iyengar, and Sanjeev Kaushik Ramani. "Symmetric Key Cryptography." In Evolution of Smart Sensing Ecosystems with Tamper Evident Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77764-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Symmetry key"

1

Dai, Linjie, and Neil C. Greenham. "Nano Tweaks to Ultrafast Non-Equilibrium Dynamics." In Frontiers in Optics. Optica Publishing Group, 2024. https://doi.org/10.1364/fio.2024.jtu4a.69.

Full text
Abstract:
Understanding and control of ultrafast non-equilibrium processes in semiconductors are key to leveraging quantum states. Here, we demonstrate the manipulation of interactions between carriers, phonons, and spins using quantum confinement and symmetry breaking through nanomorphology.
APA, Harvard, Vancouver, ISO, and other styles
2

Lin, Jie, Hoi-Kwong Lo, Jacob Johannsson, Mattia Montagna, and Manfred von Willich. "Distributed Symmetric Key Establishment: a Scalable Quantum-Safe Key Distribution Protocol." In 2024 IEEE 49th Conference on Local Computer Networks (LCN). IEEE, 2024. http://dx.doi.org/10.1109/lcn60385.2024.10639637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bange, S., A. Jäckle, S. König, et al. "MEMS Gyro Compassing: Is Symmetry the Key?" In 2023 DGON Inertial Sensors and Systems (ISS). IEEE, 2023. http://dx.doi.org/10.1109/iss58390.2023.10361927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Han, Yang, Ming Gao, Ping-xing Chen, and Cheng-zu Li. "Novel Robust Quantum Key Distribution Protocol with Symmetry." In 2008 International Conference on Computer Science and Information Technology (ICCSIT). IEEE, 2008. http://dx.doi.org/10.1109/iccsit.2008.129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

TONEV, D., G. DE ANGELIS, A. GADEA, et al. "TRANSITION PROBABILITIES: A KEY TO PROVE THE X(5) SYMMETRY." In Proceedings of the 8th International Spring Seminar on Nuclear Physics. WORLD SCIENTIFIC, 2005. http://dx.doi.org/10.1142/9789812702265_0036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tabak, Iris. "Key Components in the "Teacher as Partner": What Makes Symmetry in Teacher-Student Interactions Work?" In 2020 AERA Annual Meeting. AERA, 2020. http://dx.doi.org/10.3102/1583314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rodriguez, M., and N. W. Mureithi. "Cylinder Wake Dynamics in the Presence of Stream-Wise Harmonic Forcing." In ASME 2006 Pressure Vessels and Piping/ICPVT-11 Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/pvp2006-icpvt-11-93847.

Full text
Abstract:
The vortex wake flow dynamics downstream of a cylinder undergoing streamwise harmonic (fe/fs=1) forced oscillations has been investigated numerically using a CFD code for Re=1000. The steady-state of the wake flow has been analysed considering the amplitude of oscillations as a perturbation parameter. The resulting dynamics of the fluid lift and drag forces acting on the cylinder have been linked to the different vortex wake modes observed downstream of the cylinder. Forced oscillations lead to periodic, quasi-periodic and chaotic responses depending on the amplitude of oscillation of the cyli
APA, Harvard, Vancouver, ISO, and other styles
8

Stanishevskiy, YaroslaV. "THE SYMMETRY IN THE SYSTEMS OF KEY-RELATIONSHIP AND THE PROBLEM OF REVERSIBILITY OF THE RELATIONS BETWEEN THE TONALITIES." In SGEM 2014 Scientific SubConference on ARTS, PERFORMING ARTS, ARCHITECTURE AND DESIGN. Stef92 Technology, 2014. http://dx.doi.org/10.5593/sgemsocial2014/b41/s12.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sabo, Anica. "Understanding the Phenomenon of Symmetry in a Musical Work (Possible Aspects of Analytical Application)." In Iskošeni ugao Dragutina Gostuškog. Muzikološki institut SANU Beograd, 2024. https://doi.org/10.46793/dgost23.119s.

Full text
Abstract:
Dragutin Gostuški’s monograph Time of Art – A Contribution to the Foundation of a General Science of Forms was exceptionally important for the development of musicological scientific thought in Serbia. It mapped out the developmental paths of the sciences on arts in different ways and established some of the key principles necessary for understanding the nature of the sciences on art. Unlike the first part of the book, which examines stylistic-historical issues related to art, which is often written about and discussed in our musicological literature, the second part of the study, which consid
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Zhi, Jie Lin, Danchen Zhou, Bo Zhang, and Hai Li. "Local Symmetry Based Hint Extraction of B-Rep Model for Machining Feature Recognition." In ASME 2018 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/detc2018-85509.

Full text
Abstract:
Machining feature recognition is a key technology in design for manufacturing, inter-operation of neutral format solid models, and reuse of design models in down-streaming applications. Although many approaches have been proposed, the detection and processing of intersection features are still challenging. In this paper, we studied the local property of B-rep model and usage in intersection feature detection. To support hint based reasoning and processing, we proposed a symmetry property definition with relation to edges of solid models. This symmetry property is based on conventional edge con
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Symmetry key"

1

Hoyer, P., M. Pei, and S. Machani. Portable Symmetric Key Container (PSKC). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Turner, S. CMS Symmetric Key Management and Distribution. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Doherty, A., M. Pei, S. Machani, and M. Nystrom. Dynamic Symmetric Key Provisioning Protocol (DSKPP). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cooper, David A., and William I. MacGregor. Symmetric key injection onto smart cards. National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.ir.7539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Turner, S., and R. Housley. Cryptographic Message Syntax (CMS) Symmetric Key Package Content Type. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smyshlyaev, S., ed. Re-keying Mechanisms for Symmetric Keys. RFC Editor, 2019. http://dx.doi.org/10.17487/rfc8645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Orman, H., and P. Hoffman. Determining Strengths For Public Keys Used For Exchanging Symmetric Keys. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Housley, R., T. Polk, S. Hartman, and D. Zhang. Database of Long-Lived Symmetric Cryptographic Keys. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Turner, S. Algorithms for Cryptographic Message Syntax (CMS) Protection of Symmetric Key Package Content Types. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kempf, J., and R. Koodli. Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND). RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!