Your search for 25231 returns 4541 document(s) |
Using formal verification/analysis methods on the critical path in system design: a case study, (LNCS-Lecture Notes in Computer Science 939) Hal 367-380 |
Author: Asgeir Th. Eiriksson; Ken L. McMillan; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perfonmance Analysis of Using a Reliable Transport Layer Protocol for Transmitting EAP Message Ofer RADIUS in Inter-Domain WLAN Roaming (G1-G5) |
Author: Hadi Syafruddin
Arini Syopiansyah Jaya Putra; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Formal aspects of concurrency control on long-duration transaction systems using the NT/PV model, page 492 |
Author: Korth, Henry F. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Device authentication/ authorization protocol for home network in next generation security, (LNCS-Lecture Notes in Computer Science 5576) Hal 760-768 |
Author: Jong Sik Moon; Deok Gyu Lee; Im-Yeong Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Object-oriented systems analysis and design using UML |
Author: Bennett, Simon; | Call Number: 005.12 Ben o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protocol analysis: verbal reports as data/ K. Anders Ericsson |
Author: Ericson, K. Anders; | Call Number: 153 Eri p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fingerprint authentication system using a low-priced webcam, HAL. 689-698 |
Author: Md. Rajibhul Islam; Md. Shohel Sayeed and Andrews Samraj; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure authentication system using two-factor authenticatin techniques, HAL. 1048-1054 |
Author: Supriya Raheja; supriya khaitan and mandeep Kaur; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building multi-factor authentication provider using asp.net ( hal. E-11/E-16 ) |
Author: Adith prasetya,Anggi Wijaya,Moehammad Radif,Agus Kurniawan; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Smart Card Authentication For Internet Applications Using NFC Enabled Phone (D13-D18) |
Author: Teddy Mantoro; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|