Search Result Save to File Save as CSV
Your search for 25231 returns 4617 document(s)
Formal analysis of an authentication protocol for UMTS (Universal Mobile Telecommunications systems) Using AVISPA
Author: Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 1 No. 2 Juni 2008 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Formal analysis of an authentication protocol for UMTS ( Universal Mobile Telecommunications System) using avispa/ Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya
Author: Kurnia, Ilham W.; Stefanus, L. Yohanes; Saptawijaya, Ari | Call Number: Pub Staf.JN-0006 | Type: Jurnal Nasional
Find Similar |  Add To Favorites |  Detail in New Window 
Pembelajaran teknologi universal mobile telecommunication service (UMTS) dan streaming serta pengembangan situs berbasis web dan wirelles application protocol (WAP) dalam kerangka sistem mobile data telkomsel 3G Trial
Author: Teuku Amir Fahrul Karimuddin; | Call Number: KP-0641 (Softkopi KP- 203) (SCKP-90) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Formal Verification of a Group Membershiap Protocol Using Model (471-488)
Author: Valerio Rosset Pedro F. Souto Francisco Vasques; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
SG logic - a formal analysis technique for authentication protocols, (LNCS-Lecture Notes in Computer Science 1361) Hal 159-176
Author: Sigrid Gurgens; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Improvement and Security analysis on Symmetric key authentication Protocol Needham-Schoeder (V1-357 -- V1-360)
Author: Junyao Ye Kening Liu Yinglian Wang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Mobile RSS push using jabber protocol (hal 406 - 411)
Author: Fajar Baskoro, Dwi Ardi Irawan; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of recovery in database system using a write-ahead log protocol (hal 175 - 184)
Author: Anant Jhingran, Pratap Khedkar; | Call Number: SEM - 359 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Effient model checking of network authentication protocol based on SPIN, 100-104
Author: Zhi-hua Tan, Da-fang Zang, Li MIAO, Dan Zhao; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Data authentication protocol modeling on multilayer data hiding for multilayer protocol hiding. hal, 112
Author: Christian Gustav; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next