Search Result Save to File Save as CSV
Your search for 26949 returns 3509 document(s)
Penerapan public key infrastructure pada prototipe aplikasi internet banking
Author: Doni Aditya P.; Heru Setiawan; Kusumorini S.; Nurfani F.; Rio Sumartha H.; | Call Number: SP-035 | Type: Student Project (SP)
Find Similar |  Add To Favorites |  Detail in New Window 
Development Of Bio-Crypto Key From Fingerprints Using Cancelable Templates (689-698)
Author: Prof.Suntil VK Gaddam Prof.Manohar Lal; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
On The Use Of Mcdm Technique For Identiftying key Technology: A Case Of Auto Company (727-738)
Author: Aliakbar Mazlomi Rosnah bt.Mohd.Yusuff; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Key-insulated encryption based key pre-distribution scheme fo WSN, (LNCS-Lecture Notes in Computer Science 5576) Hal. 200-209
Author: Weidong Qiu; Yaowei Zhou; Bo Zhu; Yanfei Zheng; Mi Wen; Zheng Gong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis of the public key cryptosystem based, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 234-244
Author: George Petricles; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan sistem informasi eksekutif berbasis key performance indicator untuk bidang penelitian (Proposal Program Insentif Riset Terapan)
Author: Dana Indra Sensuse | Call Number: PRO-PROGRAM INSENTIF RISET TERAPAN-2007-014 | Type: Proposal Research (Khusus Dose
Find Similar |  Add To Favorites |  Detail in New Window 
Key attributes of sucessful knowledge management an empirical study in telecom & Software senior, HAL. 493-502
Author: Ajay Kr. Singh and Vandna Sharma; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Design and implementation of e-KTP (Indonesia Electronic Identity Card) Key Management System, Hal. 143-152
Author: Aravada Kevindra Darwis; Charles Lim; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A New strongly secure authenticated key exchange protocol, (LNCS-Lecture Notes in Computer Science 5576) Hal. 135-144
Author: Qingfeng Cheng; Chuangui Ma, and Xuexian Hu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Computationally-efficient construction for the matrix-based key distribution in sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 190-199
Author: Abeldelaziz Mohaisen; Nam-Su Jho; Dowon Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next