Search Result Save to File Save as CSV
Your search for 14338 returns 3567 document(s)
Protocols using anonymous connections: mobile applications, (LNCS-Lecture Notes in Computer Science 1361) Hal 13-23
Author: Michael G. Reed; Paul F. Syverson; David M. Goldschlag; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
SG logic - a formal analysis technique for authentication protocols, (LNCS-Lecture Notes in Computer Science 1361) Hal 159-176
Author: Sigrid Gurgens; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Formalization and verification of interaction protocols, ((LNCS-Lecture Notes in Computer Science 3668) Hal 437-438
Author: Federico Chesani; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Tripartite authenticated key agreement protocols from pairings, (LNCS-Lecture Notes in Computer Science 2898), Hal. 332-344
Author: S.S. Al. Riyami and K.G. Pterson; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications)
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Security protocols: 5th international workshop Paris, France, April, 7-9, 1997 Proceeding/Bruce Christianson
Author: Christianson, Bruce; | Call Number: 004.62 Chr s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
TCP/IP illustrated vol. 3: TCP/IP for transactions, HTTP,NNTP, and the UNIX domain protocols/W. Richard Stevens
Author: Stevens, W. Richard; | Call Number: 004.62 Ste t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Internet & TCP/IP network security: securing protocols and applications/Uday I. Prabai, Vijay K. Garbani
Author: Pabrai, Uday I.; | Call Number: 005.8 Pab i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Tinjauan Hukum Mengenai Sosialisasi, Edukasi dan Informasi tentang Kekerasan Seksual pada Anak di Kota Bandung (Studi Peraturan Daerah Kota Bandung Nomor 10 Tahun 2012 Tentang Penyelenggaraan Perlindungan Anak) (606-617)
Author: Febilita Wulan Sari Rino Adiwibowo; | Call Number: SEM-377 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   13 14 15 16 17 18 19 20 21 22  Next