Your search for 14338 returns 3567 document(s) |
Protocols using anonymous connections: mobile applications, (LNCS-Lecture Notes in Computer Science 1361) Hal 13-23 |
Author: Michael G. Reed; Paul F. Syverson; David M. Goldschlag; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158 |
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
SG logic - a formal analysis technique for authentication protocols, (LNCS-Lecture Notes in Computer Science 1361) Hal 159-176 |
Author: Sigrid Gurgens; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Formalization and verification of interaction protocols, ((LNCS-Lecture Notes in Computer Science 3668) Hal 437-438 |
Author: Federico Chesani; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tripartite authenticated key agreement protocols from pairings, (LNCS-Lecture Notes in Computer Science 2898), Hal. 332-344 |
Author: S.S. Al. Riyami and K.G. Pterson; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications) |
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security protocols: 5th international workshop Paris, France, April, 7-9, 1997 Proceeding/Bruce Christianson |
Author: Christianson, Bruce; | Call Number: 004.62 Chr s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
TCP/IP illustrated vol. 3: TCP/IP for transactions, HTTP,NNTP, and the UNIX domain protocols/W. Richard Stevens |
Author: Stevens, W. Richard; | Call Number: 004.62 Ste t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet & TCP/IP network security: securing protocols and applications/Uday I. Prabai, Vijay K. Garbani |
Author: Pabrai, Uday I.; | Call Number: 005.8 Pab i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tinjauan Hukum Mengenai Sosialisasi, Edukasi dan Informasi tentang Kekerasan Seksual pada Anak di Kota Bandung (Studi Peraturan Daerah Kota Bandung Nomor 10 Tahun 2012 Tentang Penyelenggaraan Perlindungan Anak) (606-617) |
Author: Febilita Wulan Sari
Rino Adiwibowo; | Call Number: SEM-377 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|