Indeks Artikel LNCS |
| All | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
Indeks Artikel LNCS contains 1076 collection(s) |
Weak finctional dependencies in higher-order datamodels the case of the union constructor, LNCS-Lecture Notes in Computer Science 2942), hal. 116-133 |
Author: Sven Hartmann; Sebastian Link; Kaluse Dieter Schewe; | Publisher: Springer, 2003 | Call Number: 006.33 Sei f | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Database repair by signed fomulae, LNCS-Lecture Notes in Computer Science 2942), Hal. 14-30 |
Author: Ofer Arieli; Marc Denecker; Berz Van Nuffelen and Maurice Bruynooghe; | Publisher: Springer, 2003 | Call Number: 006.33 Sei f | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Query answering and containment for regular queries under distortions, LNCS-Lecture Notes in Computer Science 2898), Hal. 98-115 |
Author: Gosta Grahne; Alex Thomo; | Publisher: Springer, 2003 | Call Number: 006.33Sei f | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Mental poker revisited, LNCS-Lecture Notes in Computer Science 2898), Hal. 370-383 |
Author: Adam Barnett and Nigel P. Smart; | Publisher: Springer, 2003 | Call Number: 005.82 Cry | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Remote user authentication using public information, LNCS-Lecture Notes in Computer Science 2898), Hal. 360-369 |
Author: Chris J. Mitchell; | Publisher: Springer, 2003 | Call Number: 005.82 Cry | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Tripartite authenticated key agreement protocols from pairings, (LNCS-Lecture Notes in Computer Science 2898), Hal. 332-344 |
Author: S.S. Al. Riyami and K.G. Pterson; | Publisher: Springer, 2003 | Call Number: 005.82 Cry | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
A General attack model on hash-based client puzzles, (LNCS-Lecture Notes in Computer Science 2898),Hal. 319-331 |
Author: Geraint Price; | Publisher: Springer, 2003 | Call Number: 005.82 Cry | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
On the correctness of scurity proofs for the 3GPP confidentiality and integrity algorithms, LNCS-Lecture Notes in Computer Science 2898), Hal. 206-318 |
Author: Testsu Iwata and Kaoru Kurosawa; | Publisher: Springer, 2003 | Call Number: 005.82 Cry | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Cryptography in wireless standards (inviteri paper), LNCS-Lecture Notes in Computer Science 2898), Hal. 303-305 |
Author: Valterri Niemi; | Publisher: Springer, 2003 | Call Number: 005.82 Cry | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Analysis of double block lengt hash function, LNCS-Lecture Notes in Computer Science 2898), Hal. 289-305 |
Author: Mitauhiro Hattori, Shoichi Hirose, and Susumu Yoshida; | Publisher: Springer, 2003 | Call Number: 005.82 Cry | Edition: |
Find Similar | Add To Favorites | Detail in New Window |
Prev 1 2 3 4 5 6 7 8 9 10 Next |