Search Result Save to File Save as CSV
Your search for 26949 returns 3509 document(s)
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Threshold key-recovery systems for RSA, (LNCS-Lecture Notes in Computer Science 1361) Hal 191-200
Author: Tatsuaki Okamoto; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 167-182
Author: Dae Hyun Yum and Pil Joong Lee; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Tripartite authenticated key agreement protocols from pairings, (LNCS-Lecture Notes in Computer Science 2898), Hal. 332-344
Author: S.S. Al. Riyami and K.G. Pterson; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Rancangan Model Algoritma Pohlig-Hellman Dengan Menggunakan Multiple-key Berdasarkan Algoritma RSA Multiple-key,65-70
Author: Allwin Simarmata, Iryanto,Sutarman,M.Andri Budiman; | Call Number: SEM-342 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Design and Application Key Determination (Dichotomy) J2ME Based Forms to Help Students in Practicum Biological Observations (hal 1362-1366)
Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Modul Attendance dan Leave Serta Peningkatan Kebutuhan dan Desain Interaksi Modul Key Performance Indicator Pada JojoTimes
Author: Kemala Andiyani; | Call Number: KP-3052 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Key management models: the 60+ models every manager needs to know 2nd ed.
Author: Assen, Marcel Van; | Call Number: 658.001 Ass k | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Ekstraksi key moments otomatis pada video perkuliahan di fasilkom UI menggunakan optical character recognition dan topic modelling
Author: Matthew Tumbur Parluhutan, Muhammad Irfan Junaidi, Muhammad Kenta Bisma Dewa Brata; | Call Number: SK-2114 (Softcopy SK-1596) Source Code SK-794 | Edition: Laksmita Rahadianti | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Prototipe Key Custodian Berbasis Server Dengan Mekanisme Otorisasi Berbasis Perangkat Mobile
Author: Prissy Azzahra Ratnadwita; | Call Number: SK-1956 (Softcopy SK-1438) Source code SK-749 | Edition: Gladhi Guarddin | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next