Your search for 35735 returns 563 document(s) |
A fast and secure encryption algorithm for message communication, HAL. 629- 634 |
Author: Paul A.J.; Varghess Paul, P. Mythili; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information secure finger print analysis using wavelets, HAL. 638-641 |
Author: S. Ramapriya, S.K. Srivatsa; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ITMS - a case study of a secure web application using OWSP guideline, Hal. 494-499 |
Author: Khairul Anwar Sedek, Mohd Nizam Osman, Nortis bt Osman; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pemilihan online secara mobile dengan protokol secure election menggunakan SMS, Hal. 551- 555 |
Author: Azis Kurniawan; Danang Jaya; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Create a secure web application and generated report as pdf, 165-174 |
Author: Murdan Sianturi, Mochamad Wahyudi; | Call Number: SEM-348 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verifikasi protokol autentifikasi Andrew secure RPC dengan proverif/ Pamela Indrajati |
Author: Pamela Indrajati; | Call Number: SK-0655 (Softcopy SK-125) Source Code SK-119 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementasi mekanisme keamanan untuk sistem informasi akademis dengan menggunakan secure provenance |
Author: M Rasyid Ridho; | Call Number: KP-1730 (SOFTCOPY KP-1292) | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementasi mekanisme keamanan pada sistem informasi akademis dengan menggunakan secure provenance |
Author: Muhammad Irfan Nasution; | Call Number: KP-1603 (Softcopy KP-1165) | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure access/ Authentication module (SAM) di PT Reka Piranti Prakarsa |
Author: Hendra Marihot; | Call Number: KP-1055 (Softkopi KP-619) SCKP-401 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure Interoperability between Cooperating XML Systems by Dynamic Role Translation (866-875) |
Author: Somchai Chatvichienchai
Mizuho Iwaihara
Yahiko Kambayashi; | Call Number: SEM-381 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|