Your search for 2414 returns 3613 document(s) |
Cryptography theory and practice 3rd ed. |
Author: Stinson, Douglas R.; | Call Number: 005.8 Sti c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings |
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan manajemen keamanan sistem informasi studi kasus Depkominfo |
Author: S. Juliandry Simanungkalit; | Call Number: T-0848 (Softcopy T-0502) | Edition: 2009 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Aplikasi kriptografi sebagai pengaman komunikasi pada PSTN berbasis FPGA, HAL. 21-27 |
Author: Muhammad Ary Murti; Sony Sumaryo; | Call Number: SEM-286 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Kriptografi kurva eliptik dan aplikasinya pada smartcard/ Wiratna S Wiguna |
Author: Wiratna Sari Wiguna; | Call Number: SK-0542(Softcopy SK-31) | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Kajian faktor-faktor yang mempengaruhi tingkat penggunaan sistem keamanan e-mail di Indonesia |
Author: Ryan Leonel; | Call Number: T-0730 (Softcopy T-0385) | Edition: 2008 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Comparison of cryptographic algorithms, HAL. 1034-1041 |
Author: Dipti Kapoor Sarmah; Neha Bajpal; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer based attack on RSA algorithm and its future credibility, HAL. 635-638 |
Author: Dinesh Dhawan, Swami Sarvanand; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Data Security |
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography: a primer |
Author: Konheim, Alan G.; | Call Number: 526 Kon c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|