Search Result Save to File Save as CSV
Your search for 36076 returns 849 document(s)
EAP-Based authentication for ad hoc network, HAL. C.133-C.138
Author: Muhammad Agni Catur Bhakti; Azween Abudllah dan Low Tan Jung; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Quantitative performance mobile ad-hoc network using optimized link state routing protocol (OLSR) and ad-hoc on-demand distance vector (AODV) (hal 443 - 448)
Author: Andreas Handijo, Justinus Andjarwirawan, Hiem Hok; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Survey of vulnerability and security of mobile ad hoc networks
Author: Siddharth S Rautaray and Sanjeev Sharma; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A source tree reliable multicast procotol for ad-hoc networks (STRM), Hal. 60-65
Author: T. Alahdal; S. Shamala; M. Othman; Z. Zukarnain; A. Alsaih; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
SURVEI PENERAPAN ALGORITMA GOSSIP JARINGAN AD HOC BERGERAK MARITIM
Author: Qurrotul Aini dan Syaifuddin; | Call Number: SEM-361 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi dan analisis kualitas layanan voip pada jaringan ad hoc peer-to-peer ( Hal 33 - 36 )-
Author: Tri Angga Bagus Antoso, Abdusy syarif, Abdi Wahab; | Call Number: SEM - 365 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi tmato firmware pada linksys wireless router dengan proses authentication,accounting menggunakan radius server. ( hal. F-51/F-55 )
Author: Rochmad Nurul Hidayat; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian tentang Aspek security dan Authentication Sistem Informasi On Line Studi Kasus : Rancangan Sistem Informasi Akademi PEFEUI
Author: Heri Yulianto; | Call Number: T-0186 (Softcopy T-0622) | Edition: 2000 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Data authentication protocol modeling on multilayer data hiding for multilayer protocol hiding. hal, 112
Author: Christian Gustav; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next