Search Result Save to File Save as CSV
Your search for 26949 returns 3509 document(s)
Making the key agreement protocol in mobile ad hoc network more efficient, (LNCS-Lecture Notes in Computer Science 2576) Hal 343-356
Author: Gang Yao; Kui Ren; Feng Bao; Robert H.Deng; Dengguo Feng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults, (LNCS-Lecture Notes in Computer Science 1361) Hal 115-124
Author: F. Bao; R.H. Deng; Y. Hang; A. Jeng; A. D. Narasimhalu; T. Ngair; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Open key exchange: how to defeat dictionary attacks without encrypting public keys, (LNCS-Lecture Notes in Computer Science 939) Hal 79-90
Author: Stefan Lucks; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Computing the M=UU t integer matrix decomposition, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 223-233
Author: Katharina Geibler and Nigel P. Smart; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan digital dashboard system untuk menyajikan key performance indicators: studi kasus bidang riset dan penelitian Fak. Ilmu Komputer UI/ Edwin Richardo
Author: Edwin Richardo; | Call Number: SK-0685 (Softcopy SK-0166) Source Code SK-0156 | Edition: Dana Indra Sensuse | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Pemenuhan Klausula ISO 9001:2000 denganmenerapkan Key Process area Requirements Management: studi kasus Soft. Develpment Center PT Fujitsu System Indonesia
Author: Astari Retnowardhani; | Call Number: T-0296 | Edition: 2002 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
More detail for combined timing and power attack againt implementation of RSA, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898) Hal. 245-263
Author: Werner Schinler and Colin D. Walter; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The X.25 protocol and seven other key CCITT recommendations: X.1., X.2, X.3, X.21, X.21bis, X.28, and X.29/ Reprinted in complete and unbridge form as they appear in fascile viii....
Call Number: 384 Int x | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Planning, designing, implementing, and managing e-government: key issues, case studies, and lessons learned: 8-12 October 2007 APCICT, Incheon, Republic of Korea Coorganized by UNU-IIST
Call Number: SEM-286 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan user interface digital dashboard untuk menyajikan key performances index dan lead indicators: studi kasus bidang pendidikan dan layanan kemahasiswaan Fakultas Ilmu Komputer Universitas Indonesia
Author: Muhammad Iqbal; | Call Number: SK-0973 (Softcopy SK-454) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next