Your search for 3044 returns 198 document(s) |
Securing mobile phone calls with identity-based cryptography, (LNCS-Lecture Notes in Computer Science 5576) Hal. 210-222 |
Author: Mathew Smith; Christian Schridde, Bjorn Agel; Bernd Freisleben; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography in wireless standards (inviteri paper), LNCS-Lecture Notes in Computer Science 2898), Hal. 303-305 |
Author: Valterri Niemi; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and coding 9th IMA international conference Cirencester, UK December 2003 proceedings/ Kenneth G. Paterson |
Call Number: 005.82 Cry | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings |
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings |
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Lecture notes in computer science: cryptography: proceedings Burg Feuerstein 1982/ edited by Thomas Beth |
Call Number: 005.82 Lec | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Number theory in science and communication: with applications in cryptography, physics digital information, computing, and self-similarity |
Author: Schroeder, M.R.; | Call Number: 512.7 Sch n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Lab Security Fasilkom UI (CCSC UI -- Center fro Cyber Security and Cryptography, Universitas Indonesia) |
Author: Febriananda Wida Pramudita; | Call Number: KP-3346 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital Document Validation Using Cryptography With Des (Data Encryption Standard) Methods (A-37 -- A-40) |
Author: Nenny Anggraini
Feri Fahrianto; | Call Number: SEM-316 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Encrypting Ontological Meta-Model Using Elliptic Curve Cryptography with Identity Based Encryption (146-149) |
Author: Pramukh R. Karla
Sang C.sUh
Varadraj P. Gurupur; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|