Your search for 26949 returns 3509 document(s) |
Making the key agreement protocol in mobile ad hoc network more efficient, (LNCS-Lecture Notes in Computer Science 2576) Hal 343-356 |
Author: Gang Yao; Kui Ren; Feng Bao; Robert H.Deng; Dengguo Feng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults, (LNCS-Lecture Notes in Computer Science 1361) Hal 115-124 |
Author: F. Bao; R.H. Deng; Y. Hang; A. Jeng; A. D. Narasimhalu; T. Ngair; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Open key exchange: how to defeat dictionary attacks without encrypting public keys, (LNCS-Lecture Notes in Computer Science 939) Hal 79-90 |
Author: Stefan Lucks; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computing the M=UU t integer matrix decomposition, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 223-233 |
Author: Katharina Geibler and Nigel P. Smart; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan digital dashboard system untuk menyajikan key performance indicators: studi kasus bidang riset dan penelitian Fak. Ilmu Komputer UI/ Edwin Richardo |
Author: Edwin Richardo; | Call Number: SK-0685 (Softcopy SK-0166) Source Code SK-0156 | Edition: Dana Indra Sensuse | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pemenuhan Klausula ISO 9001:2000 denganmenerapkan Key Process area Requirements Management: studi kasus Soft. Develpment Center PT Fujitsu System Indonesia |
Author: Astari Retnowardhani; | Call Number: T-0296 | Edition: 2002 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
More detail for combined timing and power attack againt implementation of RSA, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898) Hal. 245-263 |
Author: Werner Schinler and Colin D. Walter; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The X.25 protocol and seven other key CCITT recommendations: X.1., X.2, X.3, X.21, X.21bis, X.28, and X.29/ Reprinted in complete and unbridge form as they appear in fascile viii.... |
Call Number: 384 Int x | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Planning, designing, implementing, and managing e-government: key issues, case studies, and lessons learned: 8-12 October 2007 APCICT, Incheon, Republic of Korea Coorganized by UNU-IIST |
Call Number: SEM-286 | Type: Prosiding Seminar
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan user interface digital dashboard untuk menyajikan key performances index dan lead indicators: studi kasus bidang pendidikan dan layanan kemahasiswaan Fakultas Ilmu Komputer Universitas Indonesia |
Author: Muhammad Iqbal; | Call Number: SK-0973 (Softcopy SK-454) | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|