Search Result Save to File Save as CSV
Your search for 14200 returns 3505 document(s)
Digital color image encryption based on chaotic tent map, 329-331
Author: Songlin He; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Keamanan cloud computing dengan menggunakan fully homomophic encryption (FHE)
Author: Juan Karsten; | Call Number: SK-1228 (Softcopy SK-710) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Performance Anlysis of the Symmetric Proxy Re-encryption Scheme (91-96)
Author: Rizky Putri meiliasari Amril Syalim Setiadi Yazid; | Call Number: SEM-373 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Image Encryption Technology based on Chaos Theory (V1-632 -- V1-635)
Author: WANG Xiaoman CHU Ying LIU Peng HAN Zhiqiang JING QI WANG Xing LV RuiHua JIANG Xin; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Message Encryption Using Deceptive Text And Randomized Hashing (673-680)
Author: Vamsikrishna Yenikapati B.Poorna Satyanarayana; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Extranets and internets: e-commerce business strategies for the future/Bohdan Szuprowicz
Author: Szuprowicz, Bohdan; | Call Number: 658.8 Szu e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The semantic web: a guide to the future of XML web services and knowledge management
Author: Daconta, Michael C.; | Call Number: 415 Dac s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer-aided software engineering : the methodologies, the products, and the future/ Chris Gane
Author: Gane, Chris; | Call Number: 620.004 2 Gan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Student handbook for the study of the future/ prepared by Howard F. Didsbury, Jr.
Call Number: R. 003.2 | Type: Buku Referensi
Find Similar |  Add To Favorites |  Detail in New Window 
Computer based attack on RSA algorithm and its future credibility, HAL. 635-638
Author: Dinesh Dhawan, Swami Sarvanand; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next