Search Result Save to File Save as CSV
Your search for 2414 returns 3613 document(s)
Cryptography theory and practice 3rd ed.
Author: Stinson, Douglas R.; | Call Number: 005.8 Sti c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan manajemen keamanan sistem informasi studi kasus Depkominfo
Author: S. Juliandry Simanungkalit; | Call Number: T-0848 (Softcopy T-0502) | Edition: 2009 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Aplikasi kriptografi sebagai pengaman komunikasi pada PSTN berbasis FPGA, HAL. 21-27
Author: Muhammad Ary Murti; Sony Sumaryo; | Call Number: SEM-286 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Kriptografi kurva eliptik dan aplikasinya pada smartcard/ Wiratna S Wiguna
Author: Wiratna Sari Wiguna; | Call Number: SK-0542(Softcopy SK-31) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian faktor-faktor yang mempengaruhi tingkat penggunaan sistem keamanan e-mail di Indonesia
Author: Ryan Leonel; | Call Number: T-0730 (Softcopy T-0385) | Edition: 2008 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Comparison of cryptographic algorithms, HAL. 1034-1041
Author: Dipti Kapoor Sarmah; Neha Bajpal; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Computer based attack on RSA algorithm and its future credibility, HAL. 635-638
Author: Dinesh Dhawan, Swami Sarvanand; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and Data Security
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography: a primer
Author: Konheim, Alan G.; | Call Number: 526 Kon c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next