Search Result
Save to File
Your search for
25712
returns
4751
document(s)
Formal analysis of an authentication protocol for UMTS ( Universal Mobile Telecommunications System) using avispa/ Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya
Author: Kurnia, Ilham W.; Stefanus, L. Yohanes; Saptawijaya, Ari | Call Number: Pub Staf.JN-0006 | Type: Jurnal Nasional
Find Similar
|
Add To Favorites
|
Detail in New Window
Formal analysis of an authentication protocol for UMTS (Universal Mobile Telecommunications systems) Using AVISPA
Author: Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 1 No. 2 Juni 2008 | Type: UI-ana Indek Artikel
Find Similar
|
Add To Favorites
|
Detail in New Window
Surface representation using blossoms and buds/ L. Yohanes Stefanus
Author: L. Yohanes Stefanus | Call Number: Pub. Staf PI-0027 | Type: Prosiding Internasional
Find Similar
|
Add To Favorites
|
Detail in New Window
Shape representations with blossoms and buds/ L. Yohanes Stefanus
Author: Stefanus, L.Yohanes | Call Number: Pub.Staf PI-0029 | Type: Prosiding Internasional
Find Similar
|
Add To Favorites
|
Detail in New Window
Pembelajaran teknologi universal mobile telecommunication service (UMTS) dan streaming serta pengembangan situs berbasis web dan wirelles application protocol (WAP) dalam kerangka sistem mobile data telkomsel 3G Trial
Author: Teuku Amir Fahrul Karimuddin; | Call Number: KP-0641 (Softkopi KP- 203) (SCKP-90) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Formal Verification of a Group Membershiap Protocol Using Model (471-488)
Author: Valerio Rosset Pedro F. Souto Francisco Vasques; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
SG logic - a formal analysis technique for authentication protocols, (LNCS-Lecture Notes in Computer Science 1361) Hal 159-176
Author: Sigrid Gurgens; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Improvement and Security analysis on Symmetric key authentication Protocol Needham-Schoeder (V1-357 -- V1-360)
Author: Junyao Ye Kening Liu Yinglian Wang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Analysis of recovery in database system using a write-ahead log protocol (hal 175 - 184)
Author: Anant Jhingran, Pratap Khedkar; | Call Number: SEM - 359 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
perancangan dan pengembangan jaringan saraf hibrida PB-SKNC serta aplikasinya pada pengenalan aroma/ Ari Saptawijaya
Author: Ari Saptawijaya; | Call Number: SK-0394 | Edition: Benyamin Kusumoputro | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next