Search Result Save to File Save as CSV
Your search for 14338 returns 3567 document(s)
A VDM study of fault-tolerant stable storage towards a computer engineering mathematics,(LNCS-Lecture Notes in Computer Science 670) Hal 216-234
Author: Andrew Butterfield; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Formal techniques in real-time and fault-tolerant systems: the Int. Symposium, FTRTFT 2000 Pmil India; Sep. 20-22, 2000 proceesing
Author: Joseph, Mathai; | Call Number: 004.33 Jos j | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Penggunaan tool infra check & re-check (infracnr) untuk aktifitas IP % data network realtime fault handling pada PT Telekomunikasi Indonesia, TBK. divisi infratel
Author: Aditya Rahman Ananda; | Call Number: KP-1662 (Softcopy KP-1224) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Security protocols: internal workshop, cambridge, United Kingdom, April 1996 Proceedings/Mark Lomas
Call Number: 004.62 Sec | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
DDN protocol handbook volume 2 Darpa Internet Protocols December 1985/ Elizabeth J. Feinler
Call Number: R.355.028 Ddn | Type: Buku Referensi
Find Similar |  Add To Favorites |  Detail in New Window 
Some application of polynomials for the design of cryptographic protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-13
Author: Eyal Kushilevitz; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Forward secrecy in password-only key exchange protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 29-44
Author: Jonathan Katz; Rafail Ostrovsky; Moti Yung; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient re-keying protocols for multicast encryption, (LNCS-Lecture Notes in Computer Science 2576) Hal 119-132
Author: Giovanni Di Crescenzo; Olga Kornievskaia; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On a class of key agreement protocols which cannot be unconditionally secure, (LNCS-Lecture Notes in Computer Science 2576) Hal 133-145
Author: Frank Niedermeyer; Werner Schindler; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Security protocols for biometrics-based cardholder authentication in smartcards, (LNCS-Lecture Notes in Computer Science 2576) Hal 254-264
Author: Luciano Rila; Chris J. Mitchell; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   12 13 14 15 16 17 18 19 20 21  Next