Search Result Save to File Save as CSV
Your search for 21575 returns 4813 document(s)
A national-scale authentication infrastructure, page 60
Author: Randy Butler | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Minimum reliable scale selection in 3D, page 481
Author: C. Wyatt | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A ring signature scheme based on the nyberg-rueppel signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 169-175
Author: Chong-zhi Gao; Zheng-an Yao; Lei Li; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Wavelet Synopses for General Error Metrics, page 888-928
Author: M. Garofalakis, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
An adaption of the vector-space model for ontology-based information retrieval
Author: Castells, Pablo; Fernandez, Miriam; Vallet, David | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
An analysis of vector space models based on computational geometry, Hal. 152-160
Author: Z.W. Wang, S.K.M. Wong and Y.Y. Yao; | Call Number: SEM-254 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Trus based instrusion detection scheme for secure data transfer, Hal. 651-658
Author: Mehfuz, Shabana; Doja, M.N.; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Trust based intrusion detection scheme for secure data transfer, HAL. 651-658
Author: Shabana Mehfuz and M.N. Doja; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
An Improved CRT-based broadcast authentication scheme in WSNs, hal. 47-50
Author: Yunjie Zhu, YuShen; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Full disk encryption based on virtual machineb and ken recovery scheme, 217-222
Author: Min Liang, Jiang-ke Xu; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next