Your search for 16269 returns 3604 document(s) |
Document filtering with inference neworks, Hal. 262-269 |
Author: Jamie Callan; | Call Number: SEM-248 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Method combination for document filtering, Hal. 279-288 |
Author: David A. Hull; Jan O. Pedersen; Hinrich Schutzel; | Call Number: SEM-248 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pemanfaatan XML digital signature studi kasus integritas transkip nilai online berbasis XML, HAL. C.138-C.144 |
Author: Bernard Renaldy Suteja; Ahmad Ashari; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Enskripsi XML digital signature dengan algoritma RSA (Studi kasus: lisensi aplikasi), Hal. VI.29-VI.33 |
Author: Andi Sulistianto; Suryanto; Endro Ariyanto; | Call Number: SEM-272 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Arsitektur keamanan web service-secara terpusat menggunakan XML signature dan XML encryption, Hal. F.5-F.11 |
Author: Muhammad Syofyan; Fazmah Arif Yulianto; Sri Widowan; | Call Number: SEM-235 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Certificateless signature scheme without random oracles,(LNCS-Lecture Notes in Computer Science 5576) Hal. 31-40 |
Author: Vineela Muppavarapu ad Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An improved secure indentity-based on-lined /off-lined signature scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal. 588-597 |
Author: Jianghong Zhang; Yixian Yang; Xinxin Niu; Shengnam Gao; Hua Chen; Qin Geng; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122 |
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A threshold GQ signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 137-150 |
Author: Li-Shan Liu; Cheng-Kang Chu; Wen-Guey Tzeng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Generalized key-evolving signature schemes or how to foil an armed adversary, (LNCS-Lecture Notes in Computer Science 2576) Hal 151-168 |
Author: Gene Itkis; Peng Xie; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|