Search Result
Save to File
Your search for
16492
returns
3539
document(s)
Effient model checking of network authentication protocol based on SPIN, 100-104
Author: Zhi-hua Tan, Da-fang Zang, Li MIAO, Dan Zhao; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Building multi-factor authentication provider using asp.net ( hal. E-11/E-16 )
Author: Adith prasetya,Anggi Wijaya,Moehammad Radif,Agus Kurniawan; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Secure access/ Authentication module (SAM) di PT Reka Piranti Prakarsa
Author: Hendra Marihot; | Call Number: KP-1055 (Softkopi KP-619) SCKP-401 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Smart Card Authentication For Internet Applications Using NFC Enabled Phone (D13-D18)
Author: Teddy Mantoro; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Palmprint Authentication in Smartphone Using Phase-Only Correlation Method (397-402)
Author: Nabilah Shabrina Saiful Akbar Peb Ruswono Aryan; | Call Number: SEM-319 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Anonymous Identity Authentication Scheme In Wireless Roaming Communication (124-129)
Author: Tao Feng Wenying Zhou Xinghua Li; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Vehicle Fuel Monitoring and Management using RFID authentication and Telematics Notification (477-482)
Author: Md. Badiuzzaman Pranto Md. Mahidur Rahman Zunayeed-Bin-Zahir; | Call Number: SEM-371 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Requirements analysis and system design developing information systems with UML/ Leszek A. Maciaszek
Author: Maciaszek Leszek A.; | Call Number: 005.1 Mac r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information-Rich Commerce at a Crossroads: Bussines and Technology Adoption Requirements
Author: Robert G. Fichman, [et all] | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Sebuah kajian tentang requirements recovery pada area riset reverse engineering, Hal. B.9-B12
Author: Elviawaty Muisa Zamzani; | Call Number: SEM-300 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
4
5
6
7
8
9
10
11
12
13
Next