Gotowa bibliografia na temat „Symmetry key”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Symmetry key”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Symmetry key"
Elliott, J. P. "Key to symmetry." Nature 313, no. 6001 (1985): 409. http://dx.doi.org/10.1038/313409b0.
Pełny tekst źródłaSkinner, Mhairi. "Symmetry is key." Nature Reviews Cancer 9, no. 11 (2009): 769. http://dx.doi.org/10.1038/nrc2757.
Pełny tekst źródłaLi, Chunbiao, Jiayu Sun, Tianai Lu, and Tengfei Lei. "Symmetry Evolution in Chaotic System." Symmetry 12, no. 4 (2020): 574. http://dx.doi.org/10.3390/sym12040574.
Pełny tekst źródłaZhang, Hongjia, Junwen Huang, Xin Xu, Qiang Fang, and Yifei Shi. "Symmetry-Aware 6D Object Pose Estimation via Multitask Learning." Complexity 2020 (October 21, 2020): 1–7. http://dx.doi.org/10.1155/2020/8820500.
Pełny tekst źródłaSenjanović, Goran. "Is left–right symmetry the key?" Modern Physics Letters A 32, no. 04 (2017): 1730004. http://dx.doi.org/10.1142/s021773231730004x.
Pełny tekst źródłaMandal, Satyendra Nath, Subhankar Dutta, and Ritam Sarkar. "Block Based Symmetry Key Visual Cryptography." International Journal of Computer Network and Information Security 4, no. 9 (2012): 10–19. http://dx.doi.org/10.5815/ijcnis.2012.09.02.
Pełny tekst źródłaPIRANDOLA, STEFANO. "SYMMETRIC COLLECTIVE ATTACKS FOR THE EAVESDROPPING OF SYMMETRIC QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 06, supp01 (2008): 765–71. http://dx.doi.org/10.1142/s0219749908004080.
Pełny tekst źródłaSievers, Silvan, Martin Wehrle, Malte Helmert, and Michael Katz. "Strengthening Canonical Pattern Databases with Structural Symmetries." Proceedings of the International Symposium on Combinatorial Search 8, no. 1 (2021): 91–99. http://dx.doi.org/10.1609/socs.v8i1.18429.
Pełny tekst źródłaLi, Weijun, Guoliang Yang, Zhangyou Xiong, Xiaojuan Zhu, and Xinyu Ma. "A Traffic Flow Prediction Model Based on Dynamic Graph Convolution and Adaptive Spatial Feature Extraction." Symmetry 17, no. 7 (2025): 1007. https://doi.org/10.3390/sym17071007.
Pełny tekst źródłaZheng Mingliang. "Disturbance Decoupling for a Class of Nonlinear Control Systems Based on Lie Symmetry Method." Journal of Electrical Systems 20, no. 3 (2024): 3650–61. https://doi.org/10.52783/jes.5252.
Pełny tekst źródłaRozprawy doktorskie na temat "Symmetry key"
Reyes, Elisabeth. "Evolutionary history of floral key innovations in angiosperms." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLS489/document.
Pełny tekst źródłaAzam, Junaid. "Symmetric Key Management for Mobile Financial Applications : A Key Hierarchy Approach." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143634.
Pełny tekst źródłaTalluri, Sai Raghu. "Towards Designing Energy Efficient Symmetric Key Protocols." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/853.
Pełny tekst źródłaČanda, Valér. "Scalable symmetric block ciphers based on group bases." [S.l.] : [s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962789755.
Pełny tekst źródłaGhosh, Debeshi D. "Audio Watermarking Using DWT Algorithm and Symmetric Key Cryptography." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10263604.
Pełny tekst źródłaKamineni, Surya Bharat. "Experimental Analysis on the Feasibility of Voice Based Symmetric Key Generation for Embedded Devices." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6874.
Pełny tekst źródłaMay, Lauren Jeanette. "Design, analysis and implementation of symmetric block ciphers." Thesis, Queensland University of Technology, 2002.
Znajdź pełny tekst źródłaKasparek, Alexander J. "Secure Key Agreement for Wearable Medical Devices." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1333.
Pełny tekst źródłaHenricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16055/1/Matt_Henricksen_Thesis.pdf.
Pełny tekst źródłaHenricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16055/.
Pełny tekst źródłaKsiążki na temat "Symmetry key"
I, MacGregor William, and National Institute of Standards and Technology (U.S.), eds. Symmetric key injection onto smart cards. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008.
Znajdź pełny tekst źródłaBaksi, Anubhab. Classical and Physical Security of Symmetric Key Cryptographic Algorithms. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6522-6.
Pełny tekst źródłaWorkshop on Japan Linear Collider (JLC) (4th 1993 KEK). Proceedings of the Fourth Workshop on Japan Linear Collider (JLC): KEK, March 22-23, 1993. Edited by Kurihara Y and Kō-enerugī Butsurigaku Kenkyūjo (Japan). National Laboratory for High Energy Physics, 1994.
Znajdź pełny tekst źródłaInternational Symposium on Surface and Interface: Properties of Different Symmetry Crossing (2000 Nagoya-shi, Japan). ISSI PDSC-2000: International Symposium on Surface and Interface: Properties of Different Symmetry Crossing 2000, Aichi-ken Sangyo Boueki-kan, Nagoya, Japan, 17-20 October 2000. North-Holland, 2001.
Znajdź pełny tekst źródłaInternational Symposium on Surface and Interface: Properties of Different Symmetry Crossing (2000 Nagoya-shi, Japan). ISSI PDSC-2000: International Symposium on Surface and Interface: Properties of Different Symmetry Crossing 2000, Aichi-ken Sangyo Boueki-kan, Nagoya, Japan, 17-20 October 2000. North-Holland, 2001.
Znajdź pełny tekst źródłaSarkar, Rumu. A Fearful Symmetry. Praeger, 2010. http://dx.doi.org/10.5040/9798216968054.
Pełny tekst źródłaCzęści książek na temat "Symmetry key"
Kim, Chang Boo, Young Chul Ahn, Bo Yeon Kim, Chong Du Cho, and Hyeon Gyu Beom. "Finite Element Analysis of Blower Impeller Using Cyclic Symmetry." In Key Engineering Materials. Trans Tech Publications Ltd., 2007. http://dx.doi.org/10.4028/0-87849-456-1.1082.
Pełny tekst źródłaHong, Kyung Min, Young June Kang, Nak Kyu Park, and Weon Jae Ryu. "A Study on the Vibration Characteristics of Symmetry and Asymmetry Laminated Composite Materials by Using ESPI." In Key Engineering Materials. Trans Tech Publications Ltd., 2007. http://dx.doi.org/10.4028/0-87849-456-1.2366.
Pełny tekst źródłaLi, Yujie, Benying Tan, Shuxue Ding, Christian Desrosiers, and Ahmad Chaddad. "Symmetry Structured Analysis Sparse Coding for Key Frame Extraction." In Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20096-0_43.
Pełny tekst źródłaJona-Lasinio, Giovanni. "Spontaneous Symmetry Breaking in Particle Physics." In Springer Proceedings in Physics. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-23042-4_17.
Pełny tekst źródłaVishio, Anton. "16. A Myth of Recurrence in Iannis Xenakis’s La Légende d’Eer." In Meta-Xenakis. Open Book Publishers, 2024. http://dx.doi.org/10.11647/obp.0390.18.
Pełny tekst źródłaSergeev, Alexander, Mikhail Sergeev, Nikolaj Balonin, and Anton Vostrikov. "Symmetry Indices as a Key to Finding Matrices of Cyclic Structure for Noise-Immune Coding." In Intelligent Decision Technologies. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5925-9_19.
Pełny tekst źródłaDelfs, Hans, and Helmut Knebl. "Symmetric-Key Encryption." In Information Security and Cryptography. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-642-87126-9_2.
Pełny tekst źródłaDelfs, Hans, and Helmut Knebl. "Symmetric-Key Encryption." In Information Security and Cryptography. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/3-540-49244-5_2.
Pełny tekst źródłaDelfs, Hans, and Helmut Knebl. "Symmetric-Key Cryptography." In Information Security and Cryptography. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47974-2_2.
Pełny tekst źródłaSniatala, Pawel, S. S. Iyengar, and Sanjeev Kaushik Ramani. "Symmetric Key Cryptography." In Evolution of Smart Sensing Ecosystems with Tamper Evident Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77764-7_7.
Pełny tekst źródłaStreszczenia konferencji na temat "Symmetry key"
Dai, Linjie, and Neil C. Greenham. "Nano Tweaks to Ultrafast Non-Equilibrium Dynamics." In Frontiers in Optics. Optica Publishing Group, 2024. https://doi.org/10.1364/fio.2024.jtu4a.69.
Pełny tekst źródłaLin, Jie, Hoi-Kwong Lo, Jacob Johannsson, Mattia Montagna, and Manfred von Willich. "Distributed Symmetric Key Establishment: a Scalable Quantum-Safe Key Distribution Protocol." In 2024 IEEE 49th Conference on Local Computer Networks (LCN). IEEE, 2024. http://dx.doi.org/10.1109/lcn60385.2024.10639637.
Pełny tekst źródłaBange, S., A. Jäckle, S. König, et al. "MEMS Gyro Compassing: Is Symmetry the Key?" In 2023 DGON Inertial Sensors and Systems (ISS). IEEE, 2023. http://dx.doi.org/10.1109/iss58390.2023.10361927.
Pełny tekst źródłaHan, Yang, Ming Gao, Ping-xing Chen, and Cheng-zu Li. "Novel Robust Quantum Key Distribution Protocol with Symmetry." In 2008 International Conference on Computer Science and Information Technology (ICCSIT). IEEE, 2008. http://dx.doi.org/10.1109/iccsit.2008.129.
Pełny tekst źródłaTONEV, D., G. DE ANGELIS, A. GADEA, et al. "TRANSITION PROBABILITIES: A KEY TO PROVE THE X(5) SYMMETRY." In Proceedings of the 8th International Spring Seminar on Nuclear Physics. WORLD SCIENTIFIC, 2005. http://dx.doi.org/10.1142/9789812702265_0036.
Pełny tekst źródłaTabak, Iris. "Key Components in the "Teacher as Partner": What Makes Symmetry in Teacher-Student Interactions Work?" In 2020 AERA Annual Meeting. AERA, 2020. http://dx.doi.org/10.3102/1583314.
Pełny tekst źródłaRodriguez, M., and N. W. Mureithi. "Cylinder Wake Dynamics in the Presence of Stream-Wise Harmonic Forcing." In ASME 2006 Pressure Vessels and Piping/ICPVT-11 Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/pvp2006-icpvt-11-93847.
Pełny tekst źródłaStanishevskiy, YaroslaV. "THE SYMMETRY IN THE SYSTEMS OF KEY-RELATIONSHIP AND THE PROBLEM OF REVERSIBILITY OF THE RELATIONS BETWEEN THE TONALITIES." In SGEM 2014 Scientific SubConference on ARTS, PERFORMING ARTS, ARCHITECTURE AND DESIGN. Stef92 Technology, 2014. http://dx.doi.org/10.5593/sgemsocial2014/b41/s12.011.
Pełny tekst źródłaSabo, Anica. "Understanding the Phenomenon of Symmetry in a Musical Work (Possible Aspects of Analytical Application)." In Iskošeni ugao Dragutina Gostuškog. Muzikološki institut SANU Beograd, 2024. https://doi.org/10.46793/dgost23.119s.
Pełny tekst źródłaLi, Zhi, Jie Lin, Danchen Zhou, Bo Zhang, and Hai Li. "Local Symmetry Based Hint Extraction of B-Rep Model for Machining Feature Recognition." In ASME 2018 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/detc2018-85509.
Pełny tekst źródłaRaporty organizacyjne na temat "Symmetry key"
Hoyer, P., M. Pei, and S. Machani. Portable Symmetric Key Container (PSKC). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6030.
Pełny tekst źródłaTurner, S. CMS Symmetric Key Management and Distribution. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5275.
Pełny tekst źródłaDoherty, A., M. Pei, S. Machani, and M. Nystrom. Dynamic Symmetric Key Provisioning Protocol (DSKPP). RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6063.
Pełny tekst źródłaCooper, David A., and William I. MacGregor. Symmetric key injection onto smart cards. National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.ir.7539.
Pełny tekst źródłaTurner, S., and R. Housley. Cryptographic Message Syntax (CMS) Symmetric Key Package Content Type. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6031.
Pełny tekst źródłaSmyshlyaev, S., ed. Re-keying Mechanisms for Symmetric Keys. RFC Editor, 2019. http://dx.doi.org/10.17487/rfc8645.
Pełny tekst źródłaOrman, H., and P. Hoffman. Determining Strengths For Public Keys Used For Exchanging Symmetric Keys. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3766.
Pełny tekst źródłaHousley, R., T. Polk, S. Hartman, and D. Zhang. Database of Long-Lived Symmetric Cryptographic Keys. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7210.
Pełny tekst źródłaTurner, S. Algorithms for Cryptographic Message Syntax (CMS) Protection of Symmetric Key Package Content Types. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6160.
Pełny tekst źródłaKempf, J., and R. Koodli. Distributing a Symmetric Fast Mobile IPv6 (FMIPv6) Handover Key Using SEcure Neighbor Discovery (SEND). RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5269.
Pełny tekst źródła