Search Result Save to File Save as CSV
Your search for 26949 returns 3509 document(s)
Penerapan public key infrastructure pada pengembangan prototipe aplikasi CA engine sebagai back-end system untuk aplikasi internet banking
Author: Abraham Kristanta; Ahmad Salman R.; Haryo Timur; I snanto Nugroho; Rosita; | Call Number: SP-046 | Type: Student Project (SP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Modul Attendance dan Leave Serta Peningkatan Kebutuhan dan Desain Interaksi Modul Key Performance Indicator Pada JojoTimes
Author: Kemala Andiyani; | Call Number: KP-3052 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Providing insight and solution through data science for improving key performance indicator 9KPI) in brand squad PT Bukalapak.com
Author: Syifa Nurhayati; | Call Number: KP-2818 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Improvement and Security analysis on Symmetric key authentication Protocol Needham-Schoeder (V1-357 -- V1-360)
Author: Junyao Ye Kening Liu Yinglian Wang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Public Key Cryptosystem based on Pell's Equation Using The Gnu Mp Library (643-648
Author: K V S S R S S Sarma P S Avadhani; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Key Frame Extraction with Face Biometric Feature in Multi-shot Human Re-identification System (139-144)
Author: Agus Gunawan Dwi H. Widyantoro; | Call Number: SEM-371 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan sistem informasi eksekutif berbasis key performance indicator untuk bidang penelitian Program unggulan ICT (Proposal RUUI) tahun 2007
Author: Dana Indra Sensuse | Call Number: PRO-RUUI-2007-012 | Type: Proposal Research (Khusus Dose
Find Similar |  Add To Favorites |  Detail in New Window 
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting, (LNCS-Lecture Notes in Computer Science 5576) Hal 797-803
Author: Song-Hee Lee; Nam-Sup Park; Soo Kyun Kim; Jin-Young Choi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Round optimal distributed key generation of threshold cryptosystem based on discrete logarithm problem, (LNCS-Lecture Notes in Computer Science 2576) Hal 96-110
Author: Rui Zhang; Hideki Imai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14 15  Next