Your search for 20605 returns 5600 document(s) |
Collective Information System Use: A Typological Theory, Page 1281-1301 |
Author: Bogdan Negoita, Liette Lapointe, and Suzanne Rivard | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Nomological Network of Knowledge Management System Use: Antecedents and Consequences, Page 1275-1306 |
Author: Xiaojun Zhang and Viswanath Venkatesh | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Return on investment (ROI) of a multilevel authentication design for acces control |
Author: Ford Lumban Gaol dan Belawati Widjaja | Call Number: JIKT-6-1-September2006-1 | Type: UI-ana Indek Artikel
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Improved CRT-based broadcast authentication scheme in WSNs, hal. 47-50 |
Author: Yunjie Zhu, YuShen; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Converged PKI-Based Authorization,Authentication Management and Delegation for an E-Business |
Author: Mani Anand K.P,Narayanasamy P; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Effient model checking of network authentication protocol based on SPIN, 100-104 |
Author: Zhi-hua Tan, Da-fang Zang, Li MIAO, Dan Zhao; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building multi-factor authentication provider using asp.net ( hal. E-11/E-16 ) |
Author: Adith prasetya,Anggi Wijaya,Moehammad Radif,Agus Kurniawan; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure access/ Authentication module (SAM) di PT Reka Piranti Prakarsa |
Author: Hendra Marihot; | Call Number: KP-1055 (Softkopi KP-619) SCKP-401 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Palmprint Authentication in Smartphone Using Phase-Only Correlation Method (397-402) |
Author: Nabilah Shabrina
Saiful Akbar
Peb Ruswono Aryan; | Call Number: SEM-319 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Anonymous Identity Authentication Scheme In Wireless Roaming Communication (124-129) |
Author: Tao Feng
Wenying Zhou
Xinghua Li; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|