Search Result
Save to File
Your search for
37135
returns
358
document(s)
Clairvoyant: a cloud-based file surveillance application for protecting confidential files
Author: Rizki Mubarok; | Call Number: KP-2294 (Softcopy 1856) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Query Expansion Using Web Access Log Files (686-695)
Author: Yun Zhu; | Call Number: SEM-375 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Active Files: A Mechanism for Integrating Legacy Applications into Distributed Systems (680-690)
Author: Partha Dasgupta Ayal Itzkovitz Vijay Karamcheti; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Pemanfaatan XML digital signature studi kasus integritas transkip nilai online berbasis XML, HAL. C.138-C.144
Author: Bernard Renaldy Suteja; Ahmad Ashari; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Enskripsi XML digital signature dengan algoritma RSA (Studi kasus: lisensi aplikasi), Hal. VI.29-VI.33
Author: Andi Sulistianto; Suryanto; Endro Ariyanto; | Call Number: SEM-272 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Arsitektur keamanan web service-secara terpusat menggunakan XML signature dan XML encryption, Hal. F.5-F.11
Author: Muhammad Syofyan; Fazmah Arif Yulianto; Sri Widowan; | Call Number: SEM-235 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Certificateless signature scheme without random oracles,(LNCS-Lecture Notes in Computer Science 5576) Hal. 31-40
Author: Vineela Muppavarapu ad Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
An improved secure indentity-based on-lined /off-lined signature scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal. 588-597
Author: Jianghong Zhang; Yixian Yang; Xinxin Niu; Shengnam Gao; Hua Chen; Qin Geng; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
A threshold GQ signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 137-150
Author: Li-Shan Liu; Cheng-Kang Chu; Wen-Guey Tzeng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next