Search Result Save to File Save as CSV
Your search for 16492 returns 3539 document(s)
Effient model checking of network authentication protocol based on SPIN, 100-104
Author: Zhi-hua Tan, Da-fang Zang, Li MIAO, Dan Zhao; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Building multi-factor authentication provider using asp.net ( hal. E-11/E-16 )
Author: Adith prasetya,Anggi Wijaya,Moehammad Radif,Agus Kurniawan; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Secure access/ Authentication module (SAM) di PT Reka Piranti Prakarsa
Author: Hendra Marihot; | Call Number: KP-1055 (Softkopi KP-619) SCKP-401 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Smart Card Authentication For Internet Applications Using NFC Enabled Phone (D13-D18)
Author: Teddy Mantoro; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Palmprint Authentication in Smartphone Using Phase-Only Correlation Method (397-402)
Author: Nabilah Shabrina Saiful Akbar Peb Ruswono Aryan; | Call Number: SEM-319 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Anonymous Identity Authentication Scheme In Wireless Roaming Communication (124-129)
Author: Tao Feng Wenying Zhou Xinghua Li; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Vehicle Fuel Monitoring and Management using RFID authentication and Telematics Notification (477-482)
Author: Md. Badiuzzaman Pranto Md. Mahidur Rahman Zunayeed-Bin-Zahir; | Call Number: SEM-371 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Requirements analysis and system design developing information systems with UML/ Leszek A. Maciaszek
Author: Maciaszek Leszek A.; | Call Number: 005.1 Mac r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information-Rich Commerce at a Crossroads: Bussines and Technology Adoption Requirements
Author: Robert G. Fichman, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Sebuah kajian tentang requirements recovery pada area riset reverse engineering, Hal. B.9-B12
Author: Elviawaty Muisa Zamzani; | Call Number: SEM-300 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next