Search Result Save to File Save as CSV
Your search for 35753 returns 1131 document(s)
On ideal non-perfect secret sharing schemes, (LNCS-Lecture Notes in Computer Science 1361) Hal 207-216
Author: Pascal Paillier; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 167-182
Author: Dae Hyun Yum and Pil Joong Lee; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A type-2 fuzzy control traffic policing mechanism schemes model over high speed network using backpressure technique, 1-5
Author: Somchai Lekcharoen; | Call Number: SEM-349 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Improved Logistic-Sine Chaotic Map based S-box and Bit-Plane Scrambling Encryption Schemes Performance on Compressed ECG Data
Author: Muhammad Fauzi; Grafika Jati Muchammad Febrian Rachmadi; | Call Number: Mak T Jilid 071-095 (T-1283) (Mak T-082) | Type: Makalah Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis faktor-faktor penerimaan surat elektronik TNI AD menggunakan unifield theory of acceptance and use of technology (UTAUT) dan task technology fit (TTF): studi kasus e-Militer di TNI AD
Author: Jonni Ambarita; | Call Number: KA-516 (Softcopy KA-513) MAK KA-176 | Edition: 2014 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Inter-distance constraint: an extension of the all-different constraint for scheduling equal length jobs, (LNCS-Lecture Notes in Computer Science 3709) Hal 62-76
Author: Konstantin Artiouchine; Philippe Baptiste; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The culture of welcome of sub ethnic betawi depok and assimilation of immigrants ethnic in the family of different ethnic spouses in depok region C-1 - C-12
Author: Anisti, Santa Lorita; | Call Number: SEM-352 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A transport-level proxy for secure multimedia streams, page 57
Author: King P.F. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Trus based instrusion detection scheme for secure data transfer, Hal. 651-658
Author: Mehfuz, Shabana; Doja, M.N.; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Trust based intrusion detection scheme for secure data transfer, HAL. 651-658
Author: Shabana Mehfuz and M.N. Doja; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   18 19 20 21 22 23 24 25 26 27  Next