Your search for 13907 returns 3506 document(s) |
A Study on Edge Network Infrastructure Service (V1-288 -- V1-293) |
Author: Junfeng He
Zhangxing Peng
Fei Long
Zhenghu Gong; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information Technology Infrastructure Planning With TOGAF (B-11 -- B-20) |
Author: Hata Maulana; | Call Number: SEM-316 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
It infrastructure library a best practice, frame work for the integration of it infrastructure management and it service management, 200-214 |
Author: Fransiska Hendra, Irfan Mahendra; | Call Number: SEM-348 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Return on investment (ROI) of a multilevel authentication design for acces control |
Author: Ford Lumban Gaol dan Belawati Widjaja | Call Number: JIKT-6-1-September2006-1 | Type: UI-ana Indek Artikel
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fingerprint authentication system using a low-priced webcam, HAL. 689-698 |
Author: Md. Rajibhul Islam; Md. Shohel Sayeed and Andrews Samraj; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure authentication system using two-factor authenticatin techniques, HAL. 1048-1054 |
Author: Supriya Raheja; supriya khaitan and mandeep Kaur; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Improved CRT-based broadcast authentication scheme in WSNs, hal. 47-50 |
Author: Yunjie Zhu, YuShen; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Converged PKI-Based Authorization,Authentication Management and Delegation for an E-Business |
Author: Mani Anand K.P,Narayanasamy P; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Effient model checking of network authentication protocol based on SPIN, 100-104 |
Author: Zhi-hua Tan, Da-fang Zang, Li MIAO, Dan Zhao; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building multi-factor authentication provider using asp.net ( hal. E-11/E-16 ) |
Author: Adith prasetya,Anggi Wijaya,Moehammad Radif,Agus Kurniawan; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|