Indeks Artikel LNCS
| All | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
Indeks Artikel LNCS contains 1076 collection(s)
Weak finctional dependencies in higher-order datamodels the case of the union constructor, LNCS-Lecture Notes in Computer Science 2942), hal. 116-133
Author: Sven Hartmann; Sebastian Link; Kaluse Dieter Schewe; | Publisher: Springer, 2003 | Call Number: 006.33 Sei f | Edition:
Find Similar |  Add To Favorites |  Detail in New Window 
Database repair by signed fomulae, LNCS-Lecture Notes in Computer Science 2942), Hal. 14-30
Author: Ofer Arieli; Marc Denecker; Berz Van Nuffelen and Maurice Bruynooghe; | Publisher: Springer, 2003 | Call Number: 006.33 Sei f | Edition:
Find Similar |  Add To Favorites |  Detail in New Window 
Query answering and containment for regular queries under distortions, LNCS-Lecture Notes in Computer Science 2898), Hal. 98-115
Author: Gosta Grahne; Alex Thomo; | Publisher: Springer, 2003 | Call Number: 006.33Sei f | Edition:
Find Similar |  Add To Favorites |  Detail in New Window 
Mental poker revisited, LNCS-Lecture Notes in Computer Science 2898), Hal. 370-383
Author: Adam Barnett and Nigel P. Smart; | Publisher: Springer, 2003 | Call Number: 005.82 Cry | Edition:
Find Similar |  Add To Favorites |  Detail in New Window 
Remote user authentication using public information, LNCS-Lecture Notes in Computer Science 2898), Hal. 360-369
Author: Chris J. Mitchell; | Publisher: Springer, 2003 | Call Number: 005.82 Cry | Edition:
Find Similar |  Add To Favorites |  Detail in New Window 
Tripartite authenticated key agreement protocols from pairings, (LNCS-Lecture Notes in Computer Science 2898), Hal. 332-344
Author: S.S. Al. Riyami and K.G. Pterson; | Publisher: Springer, 2003 | Call Number: 005.82 Cry | Edition:
Find Similar |  Add To Favorites |  Detail in New Window 
A General attack model on hash-based client puzzles, (LNCS-Lecture Notes in Computer Science 2898),Hal. 319-331
Author: Geraint Price; | Publisher: Springer, 2003 | Call Number: 005.82 Cry | Edition:
Find Similar |  Add To Favorites |  Detail in New Window 
On the correctness of scurity proofs for the 3GPP confidentiality and integrity algorithms, LNCS-Lecture Notes in Computer Science 2898), Hal. 206-318
Author: Testsu Iwata and Kaoru Kurosawa; | Publisher: Springer, 2003 | Call Number: 005.82 Cry | Edition:
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography in wireless standards (inviteri paper), LNCS-Lecture Notes in Computer Science 2898), Hal. 303-305
Author: Valterri Niemi; | Publisher: Springer, 2003 | Call Number: 005.82 Cry | Edition:
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of double block lengt hash function, LNCS-Lecture Notes in Computer Science 2898), Hal. 289-305
Author: Mitauhiro Hattori, Shoichi Hirose, and Susumu Yoshida; | Publisher: Springer, 2003 | Call Number: 005.82 Cry | Edition:
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next