Search Result
Save to File
Your search for
14963
returns
3290
document(s)
Computer arithmetic logic and design
Author: Spaniol, Otto; | Call Number: 621.39 Spa C | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer engineering: hardware design
Author: Mano, M. Morris; | Call Number: 621.39 Man c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Software verification and validation
Author: Deutsch, Michael S.; | Call Number: 005.3 Deu s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Tokopedia Geolimitation Pinpoint Validation
Author: Alvin Wijaya; | Call Number: KP-2374 (Softcopy KP-1932) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Forward secrecy in password-only key exchange protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 29-44
Author: Jonathan Katz; Rafail Ostrovsky; Moti Yung; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Efficient re-keying protocols for multicast encryption, (LNCS-Lecture Notes in Computer Science 2576) Hal 119-132
Author: Giovanni Di Crescenzo; Olga Kornievskaia; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
On a class of key agreement protocols which cannot be unconditionally secure, (LNCS-Lecture Notes in Computer Science 2576) Hal 133-145
Author: Frank Niedermeyer; Werner Schindler; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Security protocols for biometrics-based cardholder authentication in smartcards, (LNCS-Lecture Notes in Computer Science 2576) Hal 254-264
Author: Luciano Rila; Chris J. Mitchell; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Protocols using anonymous connections: mobile applications, (LNCS-Lecture Notes in Computer Science 1361) Hal 13-23
Author: Michael G. Reed; Paul F. Syverson; David M. Goldschlag; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next