Search Result Save to File Save as CSV
Your search for 14048 returns 3860 document(s)
Multimodal biometric systems: a way to secure authentication, HAL. 765-771
Author: Divyakast T. Meva; R.P. Sangkhan; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A minimal model for secure computation(extended abstract),Hal 554-563
Author: Uri Feige; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A General construction of IND-CCA2 secure public key encyption,
Author: Eike Kitz and John Malone Lee; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cherri : Secure Mobile Messaging System (hal 221-225)
Author: Dony Harso, Setiyo Cahyono, Yan Adikusuma, Tri Wahyudi, Amri Shodiq, Prasetyo Adi WP, M. Taufik Y; | Call Number: SEM-370 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Building secure and reliable network applicatins/Kenneth P. Birman
Author: Birman, Kenneth P.; | Call Number: 004.36 Bir b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Secure mobile payment solution PT. Iguana Technology
Author: Syntia Wijaya Dharma; | Call Number: KP-0724 (Softkopi KP-288) (SCKP-163) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Developing secure applications with visual basic/Davis Chapman
Author: Chapman, Davis; | Call Number: 005.45 Cha d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Pembuatan acceptable use policy (AUP) and secure procedure
Author: Eulis Fitriansyah; | Call Number: KP-1122 (Softkopi KP-685) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pembuatan acceptable use policies dan secure-use procedures
Author: Ogie Oktama; | Call Number: KP-1108 (Softkopi KP-671) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Honeypot based Secure Network System (519-528)
Author: Yogendra Kumar Jain Surabhi Singh; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   9 10 11 12 13 14 15 16 17 18  Next