Search Result Save to File Save as CSV
Your search for 35857 returns 3863 document(s)
Side-Channel attack on substitution blocks, (LNCS-Lecture Notes in Computer Science 2576) Hal 307-318
Author: Roman Novak; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Rectangle attack on 49-round shacal-1, (LNCS-Lecture Notes in Computer Science 2887) Hal 22-35
Author: Eli Biham; Orr Dunkelman; Nathan Keller; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Protocol interactions and the chosen protocol attack, LNCS-Lecture Notes in Computer Science 1361) Hal 91-104
Author: John Kelsey; Bruce Schneier; David Wagner; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Improved fast correlation attack using low rate codes, (LNCS-Lecture Notes in Computer Science 2898), Hal. 67-81
Author: Havard Molland; Jaohn Erik Mathinasen, Tor Helleseth; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Computer-aided software engineering : the methodologies, the products, and the future/ Chris Gane
Author: Gane, Chris; | Call Number: 620.004 2 Gan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer-aided software engineering: the methodologies the product and the future/Chris Gane
Author: Gane, Chris; | Call Number: 620.004 2 Gan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer telephony and wireless technologies: future directions in communications/Bob Emmerson
Author: Emmerson, Bob; | Call Number: 651.7 Emm c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Aplikasi kriptografi sebagai pengaman komunikasi pada PSTN berbasis FPGA, HAL. 21-27
Author: Muhammad Ary Murti; Sony Sumaryo; | Call Number: SEM-286 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Kriptografi kurva eliptik dan aplikasinya pada smartcard/ Wiratna S Wiguna
Author: Wiratna Sari Wiguna; | Call Number: SK-0542(Softcopy SK-31) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian faktor-faktor yang mempengaruhi tingkat penggunaan sistem keamanan e-mail di Indonesia
Author: Ryan Leonel; | Call Number: T-0730 (Softcopy T-0385) | Edition: 2008 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next