Search Result Save to File Save as CSV
Your search for 32649 returns 3749 document(s)
A ring signature scheme based on the nyberg-rueppel signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 169-175
Author: Chong-zhi Gao; Zheng-an Yao; Lei Li; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Normal Based Subdivision Scheme for Curve Design, page 243-260
Author: X. Yang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
General scheme of region competition based on scale space, page 1366
Author: M. Tang And S. Ma | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
An Improved CRT-based broadcast authentication scheme in WSNs, hal. 47-50
Author: Yunjie Zhu, YuShen; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Full disk encryption based on virtual machineb and ken recovery scheme, 217-222
Author: Min Liang, Jiang-ke Xu; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Networking Scheme for Transmission Line Monitoring System Based on loT (180-184)
Author: ruixue LI Jianming LIU Xiangzhen LI; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Semantic Broadcast Scheme for a Mobile Environment based on Dynamic Chunking (522-229)
Author: K. Lee H. Leong A. Si; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A secure group rekeying scheme with compromised node revocation in wireless sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 712-721
Author: Asma Khalid; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Multi-party computation from any linear scret sharing scheme unconditionally secure againts adaptive adversary: the zero-error case, hal. 1-15
Author: Ventzislav Nikov; Svotla Nikova; Bark Preneel; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient and Secure Routing Protocol for Wireless Sensor Networks using Mine Detection (An Extension of Triple Umpiring System for WSN) (141-145)
Author: Ganesh Subramanian Dr.R.Amutha; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next