Search Result Save to File Save as CSV
Your search for 35752 returns 3459 document(s)
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Validating a biometric authentication system: sample size requirements, page 1902
Author: S.C. Dass, Y. Zhu | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Java-based internet biometric authentication system, page 1166
Author: R.A.J. Everitt | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Information secure finger print analysis using wavelets, HAL. 638-641
Author: S. Ramapriya, S.K. Srivatsa; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
ITMS - a case study of a secure web application using OWSP guideline, Hal. 494-499
Author: Khairul Anwar Sedek, Mohd Nizam Osman, Nortis bt Osman; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Expert system: techniques, tools, and applications
Call Number: 006.33 Kla e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Analyzing the techniques to secure web database applications from SQL injectino attacks, HAL. 1349-1355
Author: Sushila Madan and Supriya Madan; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pattern based Design for Secure and Safe Mobile Agent System (13-17)
Author: N. Yoshioka Y. Tahara S. Honiden A. System; | Call Number: SEM-306 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
IMS programming techniques: a guide to using DL/I
Author: Kapp, Dan; | Call Number: 005.74 Kap p | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
ATM traffic control using AI techniques, Hal. 36-38
Author: Thong-Seng Quah, Che-Kheong Siew, Santhosh Paremeswarah; | Call Number: SEM-275 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next