Search Result Save to File Save as CSV
Your search for 35706 returns 3800 document(s)
A Xor based public auditing scheme for proof-of -storage
Author: Changsheng Wan; Juan Zhang; | Call Number: Sem-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Honeypot based Secure Network System (519-528)
Author: Yogendra Kumar Jain Surabhi Singh; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis faktor customer experience terhadap proses trust transfer e-commerce shopee yang memengaruhi adopsi bank digital seabank
Author: Evita Haliansyah, Nathanael Pardosi, Vioren Paramita Adithana; | Call Number: SK-2097 (Softcopy SK-1579) | Edition: Achmad Nizar Hidayanto | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis Faktor Yang Mendorong Adopsi Aplikasi Bank Digital Di Indonesia: Persoektif Trust Transfer, Teori Innovation Diffusion, Dan Teori Valence
Author: Marcel Valdhano; | Call Number: SK-2006 (Softcopy SK-1488) | Edition: Achmad Nizar Hidayanto | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis faktor-faktor yang memengaruhi Trust transfer terhadap niat keberlanjutan penggunaan layanan konsultasi telemedicine pasca pandemi covid-19
Author: Shinta fauziah; | Call Number: SK-2043 (Softcopy SK-1525) | Edition: Achmad Nizar Hidayanto | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Teori Trust Transfer pada Niat Penggunaan Aplikasi Kencan Online dengan Moderasi Dimensi Budaya Hofstede
Author: Shannia Dwi Meliant; | Call Number: Sk-1900 (Softcopy SK-1382) | Edition: Achmsd Nizar Hidayanto | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis Faktor-Faktor Kepercayaan Konsumen dan Pengaruh Trust Transfer terhadap Repurchase Intention Layanan Go-Lif
Author: Alifa Fathia Khaerani; | Call Number: SK-1681 (Softcopy SK-1681) | Edition: Putu Wuri Handayani | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Small object detection based on SSD-resnextt101
Author: Uus Khusni; | Call Number: TR-CSUI/030 (026-030) 2022 | Type: Technical Report
Find Similar |  Add To Favorites |  Detail in New Window 
Domain specifict intented use evaluation method: intrusion detection spesific intented use evaluation method, (LNCS-Lecture Notes in Computer Science 5576) Hal 778-787
Author: Albert Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Intelligent scheme of data security and message transmission, HAL. 453-455
Author: Prasun Chakrabarti; Shambit Saha, Ranjan Lahiri; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next