Search Result Save to File Save as CSV
Your search for 25712 returns 4394 document(s)
Formal analysis of an authentication protocol for UMTS ( Universal Mobile Telecommunications System) using avispa/ Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya
Author: Kurnia, Ilham W.; Stefanus, L. Yohanes; Saptawijaya, Ari | Call Number: Pub Staf.JN-0006 | Type: Jurnal Nasional
Find Similar |  Add To Favorites |  Detail in New Window 
Formal analysis of an authentication protocol for UMTS (Universal Mobile Telecommunications systems) Using AVISPA
Author: Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 1 No. 2 Juni 2008 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Surface representation using blossoms and buds/ L. Yohanes Stefanus
Author: L. Yohanes Stefanus | Call Number: Pub. Staf PI-0027 | Type: Prosiding Internasional
Find Similar |  Add To Favorites |  Detail in New Window 
Shape representations with blossoms and buds/ L. Yohanes Stefanus
Author: Stefanus, L.Yohanes | Call Number: Pub.Staf PI-0029 | Type: Prosiding Internasional
Find Similar |  Add To Favorites |  Detail in New Window 
Pembelajaran teknologi universal mobile telecommunication service (UMTS) dan streaming serta pengembangan situs berbasis web dan wirelles application protocol (WAP) dalam kerangka sistem mobile data telkomsel 3G Trial
Author: Teuku Amir Fahrul Karimuddin; | Call Number: KP-0641 (Softkopi KP- 203) (SCKP-90) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Formal Verification of a Group Membershiap Protocol Using Model (471-488)
Author: Valerio Rosset Pedro F. Souto Francisco Vasques; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
SG logic - a formal analysis technique for authentication protocols, (LNCS-Lecture Notes in Computer Science 1361) Hal 159-176
Author: Sigrid Gurgens; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Improvement and Security analysis on Symmetric key authentication Protocol Needham-Schoeder (V1-357 -- V1-360)
Author: Junyao Ye Kening Liu Yinglian Wang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of recovery in database system using a write-ahead log protocol (hal 175 - 184)
Author: Anant Jhingran, Pratap Khedkar; | Call Number: SEM - 359 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
perancangan dan pengembangan jaringan saraf hibrida PB-SKNC serta aplikasinya pada pengenalan aroma/ Ari Saptawijaya
Author: Ari Saptawijaya; | Call Number: SK-0394 | Edition: Benyamin Kusumoputro | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next