Your search for 25231 returns 4617 document(s) |
Formal analysis of an authentication protocol for UMTS (Universal Mobile Telecommunications systems) Using AVISPA |
Author: Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 1 No. 2 Juni 2008 | Type: UI-ana Indek Artikel
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Formal analysis of an authentication protocol for UMTS ( Universal Mobile Telecommunications System) using avispa/ Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya |
Author: Kurnia, Ilham W.; Stefanus, L. Yohanes; Saptawijaya, Ari | Call Number: Pub Staf.JN-0006 | Type: Jurnal Nasional
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pembelajaran teknologi universal mobile telecommunication service (UMTS) dan streaming serta pengembangan situs berbasis web dan wirelles application protocol (WAP) dalam kerangka sistem mobile data telkomsel 3G Trial |
Author: Teuku Amir Fahrul Karimuddin; | Call Number: KP-0641 (Softkopi KP- 203) (SCKP-90) | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Formal Verification of a Group Membershiap Protocol Using Model (471-488) |
Author: Valerio Rosset
Pedro F. Souto
Francisco Vasques; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
SG logic - a formal analysis technique for authentication protocols, (LNCS-Lecture Notes in Computer Science 1361) Hal 159-176 |
Author: Sigrid Gurgens; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Improvement and Security analysis on Symmetric key authentication Protocol Needham-Schoeder (V1-357 -- V1-360) |
Author: Junyao Ye
Kening Liu
Yinglian Wang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Mobile RSS push using jabber protocol (hal 406 - 411) |
Author: Fajar Baskoro, Dwi Ardi Irawan; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analysis of recovery in database system using a write-ahead log protocol (hal 175 - 184) |
Author: Anant Jhingran, Pratap Khedkar; | Call Number: SEM - 359 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Effient model checking of network authentication protocol based on SPIN, 100-104 |
Author: Zhi-hua Tan, Da-fang Zang, Li MIAO, Dan Zhao; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data authentication protocol modeling on multilayer data hiding for multilayer protocol hiding. hal, 112 |
Author: Christian Gustav; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|