Search Result Save to File Save as CSV
Your search for 35611 returns 636 document(s)
Building Reusable Mobile Agents (1-6)
Author: Ichiro Satoh; | Call Number: SEM-306 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Performance analysis of digital secure voice transmission over HF radio channel, (LNCS-Lecture Notes in Computer Science 5576) Hal. 337-346
Author: Kihong Kim; Jinkeun Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secure multi-party computation using virtual parties for computation on encrypted data, (LNCS-Lecture Notes in Computer Science 5576) Hal. 412-421
Author: Rohit Pathak; Satyadhar Joshi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A secure group rekeying scheme with compromised node revocation in wireless sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 712-721
Author: Asma Khalid; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting, (LNCS-Lecture Notes in Computer Science 5576) Hal 797-803
Author: Song-Hee Lee; Nam-Sup Park; Soo Kyun Kim; Jin-Young Choi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Multi-party computation from any linear scret sharing scheme unconditionally secure againts adaptive adversary: the zero-error case, hal. 1-15
Author: Ventzislav Nikov; Svotla Nikova; Bark Preneel; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan prototipe sistem secure data transfer secara offline menggunakan teknologi smart card dan near field communication (NFC) pada perangkat android
Author: Ruhush, Shoalihin; | Call Number: SK-1390 (Softcopy SK-872) Source code SK-563 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Rancangan Spesifikasi Secure Access Service Edge (SASE) Cloud untuk Keamanan Jaringan Kantor Cabang: Studi Kasus PT XYZ Finance
Author: Hendro; | Call Number: KA-1333 (Softcopi KA-1326) MAK KA-977 | Edition: 2020 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Solusi framework XYZ secure scrum untuk peningkatan kualitas keamanan informasi dan keandalan aplikasi yang dikembangkan secara internal: studi kasus pada PT XYZ
Author: Surya Sumirat; | Call Number: KA-975 (Softcopy KA-972) MAK KA-627 | Edition: 2017 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Second generation mobile and wireless networks/Uyless D. Black
Author: Black, Uyless D.; | Call Number: 621.382 Bla s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   9 10 11 12 13 14 15 16 17 18  Next