Your search for 35752 returns 3459 document(s) |
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158 |
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Validating a biometric authentication system: sample size requirements, page 1902 |
Author: S.C. Dass, Y. Zhu | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Java-based internet biometric authentication system, page 1166 |
Author: R.A.J. Everitt | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information secure finger print analysis using wavelets, HAL. 638-641 |
Author: S. Ramapriya, S.K. Srivatsa; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ITMS - a case study of a secure web application using OWSP guideline, Hal. 494-499 |
Author: Khairul Anwar Sedek, Mohd Nizam Osman, Nortis bt Osman; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Expert system: techniques, tools, and applications |
Call Number: 006.33 Kla e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analyzing the techniques to secure web database applications from SQL injectino attacks, HAL. 1349-1355 |
Author: Sushila Madan and Supriya Madan; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pattern based Design for Secure and Safe Mobile Agent System (13-17) |
Author: N. Yoshioka
Y. Tahara
S. Honiden
A. System; | Call Number: SEM-306 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
IMS programming techniques: a guide to using DL/I |
Author: Kapp, Dan; | Call Number: 005.74 Kap p | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ATM traffic control using AI techniques, Hal. 36-38 |
Author: Thong-Seng Quah, Che-Kheong Siew, Santhosh Paremeswarah; | Call Number: SEM-275 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|