Search Result Save to File Save as CSV
Your search for 3044 returns 198 document(s)
Securing mobile phone calls with identity-based cryptography, (LNCS-Lecture Notes in Computer Science 5576) Hal. 210-222
Author: Mathew Smith; Christian Schridde, Bjorn Agel; Bernd Freisleben; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography in wireless standards (inviteri paper), LNCS-Lecture Notes in Computer Science 2898), Hal. 303-305
Author: Valterri Niemi; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and coding 9th IMA international conference Cirencester, UK December 2003 proceedings/ Kenneth G. Paterson
Call Number: 005.82 Cry | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Lecture notes in computer science: cryptography: proceedings Burg Feuerstein 1982/ edited by Thomas Beth
Call Number: 005.82 Lec | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Number theory in science and communication: with applications in cryptography, physics digital information, computing, and self-similarity
Author: Schroeder, M.R.; | Call Number: 512.7 Sch n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Lab Security Fasilkom UI (CCSC UI -- Center fro Cyber Security and Cryptography, Universitas Indonesia)
Author: Febriananda Wida Pramudita; | Call Number: KP-3346 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Digital Document Validation Using Cryptography With Des (Data Encryption Standard) Methods (A-37 -- A-40)
Author: Nenny Anggraini Feri Fahrianto; | Call Number: SEM-316 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Encrypting Ontological Meta-Model Using Elliptic Curve Cryptography with Identity Based Encryption (146-149)
Author: Pramukh R. Karla Sang C.sUh Varadraj P. Gurupur; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   11 12 13 14 15 16 17 18 19 20  Next