Your search for 35474 returns 2184 document(s) |
ALgorithma blowfish untuk pengamanan data, HAL. 151- 156 |
Author: Indra Yatini B.; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementasi real time voice scrambler pada DSK TMS320CS402 dengan menggunakan metode kriptografi RCA, HAL. C.113-C.118 |
Author: Mike Yuliana; Titon Dutono; Wirawan; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Sistem keamanan transaksi data dengan menerapkan XML enkripsi dan XML SIGNATURE dengan menggunakan metode FAST ( hal. F-68 - F-75 ) |
Author: Slamet Wiodo; | Call Number: SEM-365 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisis kinerja voip cilent sipdroid dengan modul enkripsi terintegrasi ( hal. G-7 - G-12 ) |
Author: Rizal "Broer" Bahawers , Mudrik Alaydrus , Abdi Wahab; | Call Number: SEM-365 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Scaled structure in visualized TREC data and query feedback, page 151 |
Author: Mark Rorvig | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Konsolidasi database kependudukan nasional, HAL. E.27-E.32 |
Author: Riana Kuswandi; Husni Fahmi; Haret Faidah; Herald Setiadi, Zainal A. Hasibuan; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Aplikasi chat conference pada mobile phone dengan menggunakan enkripsi. ( hal. F-24/F-29 ) |
Author: Johan Mulya Kerta,Hendra,Jimmy Suhartono,and Sumario; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Modifikasi Spread Spectrum Watermarking dari Cox Berbasiskan pada Enkripsi Chaotic (11) |
Author: Rinaldi Munir
Bambang Riyanto
Sarwono Sutikno
Wiseto P. Agung; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient Queue and GSI Security Management Framework for Mobile Desktop Grid,Hal. 84-88 |
Author: Muhammad Imran Sarwar, Mohamad Azam Osman; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Kombinasi Vigenere Cipher Dalam Three Pass Protocol |
Author: Boni Oktaviana, Mangku Mondroguno; | Call Number: SEM-342 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|