Search Result
Save to File
Your search for
26949
returns
3509
document(s)
Penerapan public key infrastructure pada pengembangan prototipe aplikasi CA engine sebagai back-end system untuk aplikasi internet banking
Author: Abraham Kristanta; Ahmad Salman R.; Haryo Timur; I snanto Nugroho; Rosita; | Call Number: SP-046 | Type: Student Project (SP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan Modul Attendance dan Leave Serta Peningkatan Kebutuhan dan Desain Interaksi Modul Key Performance Indicator Pada JojoTimes
Author: Kemala Andiyani; | Call Number: KP-3052 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Providing insight and solution through data science for improving key performance indicator 9KPI) in brand squad PT Bukalapak.com
Author: Syifa Nurhayati; | Call Number: KP-2818 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Improvement and Security analysis on Symmetric key authentication Protocol Needham-Schoeder (V1-357 -- V1-360)
Author: Junyao Ye Kening Liu Yinglian Wang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Public Key Cryptosystem based on Pell's Equation Using The Gnu Mp Library (643-648
Author: K V S S R S S Sarma P S Avadhani; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Key Frame Extraction with Face Biometric Feature in Multi-shot Human Re-identification System (139-144)
Author: Agus Gunawan Dwi H. Widyantoro; | Call Number: SEM-371 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan sistem informasi eksekutif berbasis key performance indicator untuk bidang penelitian Program unggulan ICT (Proposal RUUI) tahun 2007
Author: Dana Indra Sensuse | Call Number: PRO-RUUI-2007-012 | Type: Proposal Research (Khusus Dose
Find Similar
|
Add To Favorites
|
Detail in New Window
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting, (LNCS-Lecture Notes in Computer Science 5576) Hal 797-803
Author: Song-Hee Lee; Nam-Sup Park; Soo Kyun Kim; Jin-Young Choi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Round optimal distributed key generation of threshold cryptosystem based on discrete logarithm problem, (LNCS-Lecture Notes in Computer Science 2576) Hal 96-110
Author: Rui Zhang; Hideki Imai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
6
7
8
9
10
11
12
13
14
15
Next