Your search for 16492 returns 3539 document(s) |
Security protocols for biometrics-based cardholder authentication in smartcards, (LNCS-Lecture Notes in Computer Science 2576) Hal 254-264 |
Author: Luciano Rila; Chris J. Mitchell; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Helix: Fast encryption and authentication single cryptographic primitive, (LNCS-Lecture Notes in Computer Science 2887) Hal 330-346 |
Author: Niels Ferguson; Doug Whiting; Bruce Schneier; John Kelsey; Stefan Lucks; Tadayoshi Kohno; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158 |
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
SG logic - a formal analysis technique for authentication protocols, (LNCS-Lecture Notes in Computer Science 1361) Hal 159-176 |
Author: Sigrid Gurgens; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Remote user authentication using public information, LNCS-Lecture Notes in Computer Science 2898), Hal. 360-369 |
Author: Chris J. Mitchell; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fingerprint synthesis towards constructing an enhanced authentication system using low resolution webcam, Hal. 679-688 |
Author: islam, Md. Rajibul; Sayeed, Md. Shobel; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data authentication protocol modeling on multilayer data hiding for multilayer protocol hiding. hal, 112 |
Author: Christian Gustav; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Adopsi enkripsi jefferson wheel pada protokol one-tme password authentication untuk pencegahan sniffing pada password e-mail. ( hal. F-1/F-5 ) |
Author: Vega Valentine,Anne Yuliyanti,Bertalya; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementasi tmato firmware pada linksys wireless router dengan proses authentication,accounting menggunakan radius server. ( hal. F-51/F-55 ) |
Author: Rochmad Nurul Hidayat; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Model implementasi infrastruktur klien central authentication service untuk keperluan single sign on, studi kasus: Universitas Indonesia |
Author: Phillip Leonardo; | Call Number: SK-0954 (Softcopy SK-435) Source code SK--355 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|