Search Result Save to File Save as CSV
Your search for 35474 returns 2118 document(s)
ALgorithma blowfish untuk pengamanan data, HAL. 151- 156
Author: Indra Yatini B.; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi real time voice scrambler pada DSK TMS320CS402 dengan menggunakan metode kriptografi RCA, HAL. C.113-C.118
Author: Mike Yuliana; Titon Dutono; Wirawan; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Sistem keamanan transaksi data dengan menerapkan XML enkripsi dan XML SIGNATURE dengan menggunakan metode FAST ( hal. F-68 - F-75 )
Author: Slamet Wiodo; | Call Number: SEM-365 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis kinerja voip cilent sipdroid dengan modul enkripsi terintegrasi ( hal. G-7 - G-12 )
Author: Rizal "Broer" Bahawers , Mudrik Alaydrus , Abdi Wahab; | Call Number: SEM-365 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Scaled structure in visualized TREC data and query feedback, page 151
Author: Mark Rorvig | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Konsolidasi database kependudukan nasional, HAL. E.27-E.32
Author: Riana Kuswandi; Husni Fahmi; Haret Faidah; Herald Setiadi, Zainal A. Hasibuan; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Aplikasi chat conference pada mobile phone dengan menggunakan enkripsi. ( hal. F-24/F-29 )
Author: Johan Mulya Kerta,Hendra,Jimmy Suhartono,and Sumario; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Modifikasi Spread Spectrum Watermarking dari Cox Berbasiskan pada Enkripsi Chaotic (11)
Author: Rinaldi Munir Bambang Riyanto Sarwono Sutikno Wiseto P. Agung; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient Queue and GSI Security Management Framework for Mobile Desktop Grid,Hal. 84-88
Author: Muhammad Imran Sarwar, Mohamad Azam Osman; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Kombinasi Vigenere Cipher Dalam Three Pass Protocol
Author: Boni Oktaviana, Mangku Mondroguno; | Call Number: SEM-342 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next