Search Result
Save to File
Your search for
32649
returns
3782
document(s)
A ring signature scheme based on the nyberg-rueppel signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 169-175
Author: Chong-zhi Gao; Zheng-an Yao; Lei Li; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Normal Based Subdivision Scheme for Curve Design, page 243-260
Author: X. Yang | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
General scheme of region competition based on scale space, page 1366
Author: M. Tang And S. Ma | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
An Improved CRT-based broadcast authentication scheme in WSNs, hal. 47-50
Author: Yunjie Zhu, YuShen; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Full disk encryption based on virtual machineb and ken recovery scheme, 217-222
Author: Min Liang, Jiang-ke Xu; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A Networking Scheme for Transmission Line Monitoring System Based on loT (180-184)
Author: ruixue LI Jianming LIU Xiangzhen LI; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A Semantic Broadcast Scheme for a Mobile Environment based on Dynamic Chunking (522-229)
Author: K. Lee H. Leong A. Si; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A secure group rekeying scheme with compromised node revocation in wireless sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 712-721
Author: Asma Khalid; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Multi-party computation from any linear scret sharing scheme unconditionally secure againts adaptive adversary: the zero-error case, hal. 1-15
Author: Ventzislav Nikov; Svotla Nikova; Bark Preneel; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Efficient and Secure Routing Protocol for Wireless Sensor Networks using Mine Detection (An Extension of Triple Umpiring System for WSN) (141-145)
Author: Ganesh Subramanian Dr.R.Amutha; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next