Search Result Save to File Save as CSV
Your search for 13540 returns 3561 document(s)
A comparative analysis of HC-128 and rabbit encryption schemes for pervasive computing in WSN environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 682-691
Author: Firdous Kausar; Ayesha Naureen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Computing the M=UU t integer matrix decomposition, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 223-233
Author: Katharina Geibler and Nigel P. Smart; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis of the public key cryptosystem based, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 234-244
Author: George Petricles; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
More detail for combined timing and power attack againt implementation of RSA, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898) Hal. 245-263
Author: Werner Schinler and Colin D. Walter; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Designing and building parallel programs: concepts and tools for parallel software engineering/Ian I. Foster
Author: Foster, Ian; | Call Number: 005.2 Fos d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Parallel Computing And Architecture: A Foundation for Designing Deadlock-Free Routing Algorithms in Wormhole Networks
Author: D. N. Jayasimha, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Designing the user interface: strategies for effective human-computer interaction 4th ed. (INSTRUCTOR'S MANUAL)
Author: Shneiderman, Ben; | Call Number: 004.6 Shn d | Type: Instructor's Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Class majority in designing euclidean fuzzy local approximation NN for overlaping data in pattern classification/ Muhammad R. Widyanto
Author: Widyanto, M. Rahamt; Kawamoto, Kazahiko; Kusumpoutro, Benyamin; Hirota, Kaoru | Call Number: Pub. Staf JI-0006 | Type: Jurnal Internasional
Find Similar |  Add To Favorites |  Detail in New Window 
Designing the user interface: strategies for effective human-computer interaction 5th ed. (INSTRUCTOR'S MANUAL)
Author: Shneiderman, Ben; | Call Number: 004.6 Shn d | Type: Instructor's Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   11 12 13 14 15 16 17 18 19 20  Next