Search Result Save to File Save as CSV
Your search for 25569 returns 2209 document(s)
Improvement and Security analysis on Symmetric key authentication Protocol Needham-Schoeder (V1-357 -- V1-360)
Author: Junyao Ye Kening Liu Yinglian Wang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Design Secure Protocol Electronic Payment Using Pulse Of Handphone Based On HMAC Algorithm (203-213)
Author: Jenny Irna Eva Sari Ninik Ratna; | Call Number: Sem-327 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi Wireles Application Protocol Advertising Pada Penjual Mobil Bekas dengan Teknologi Java Server Pages (481-488)
Author: Setiawan Alexander; | Call Number: SEM-315 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient and Secure Routing Protocol for Wireless Sensor Networks using Mine Detection (An Extension of Triple Umpiring System for WSN) (141-145)
Author: Ganesh Subramanian Dr.R.Amutha; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A New Network Layer Protocol with Routing Address and Tables Auto- Configuration Mechanism (84-96)
Author: H. Mori K. Sakamura; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Mobile Cache Protocol: A Dynamic Object Relocation Protokol for Wide Area Networks (420-427)
Author: T. Watanabe A. Mori Y. Yamamoto; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Formal analysis of an authentication protocol for UMTS ( Universal Mobile Telecommunications System) using avispa/ Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya
Author: Kurnia, Ilham W.; Stefanus, L. Yohanes; Saptawijaya, Ari | Call Number: Pub Staf.JN-0006 | Type: Jurnal Nasional
Find Similar |  Add To Favorites |  Detail in New Window 
Design and implementation of the end system to intermediate system (ES-IS) routing information exchange protocol AS a loadable kernel module in linux kernel 2.6, HAL. 253-258
Author: Stella Maria; Maulahikmah Galinium; Husni Fahmi; Haret Fidah; James Purnamal; Charles Lim; Harya Damar; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Peningkatan efektifitas akses internet dengan menggunakan fasilitas intenet protocol virtual private network (IP VPN) dan manajemen bandwith untuk akses internet bersama pada Sekolah, HAL. C.81-C.85
Author: Purnomo Hendradi; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting, (LNCS-Lecture Notes in Computer Science 5576) Hal 797-803
Author: Song-Hee Lee; Nam-Sup Park; Soo Kyun Kim; Jin-Young Choi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next