Your search for 37620 returns 2905 document(s) |
Toupie = u-calculus + constraints, (LNCS-Lecture Notes in Computer Science 939) Hal 114-126 |
Author: Antoine Rauzy; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Differential uniformity for arrays, (LNCS-Lecture Notes in Computer Science 2898), Hal. 115-124 |
Author: K.J. Horadam; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Predicting the inversive generator, LNCS-Lecture Notes in Computer Science 2898), hal. 264-275 |
Author: Simon R. Blakburn; Domingo Gomez-Peres; Jaime Gutierez and Igor E. F. Shparlinski; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Mental poker revisited, LNCS-Lecture Notes in Computer Science 2898), Hal. 370-383 |
Author: Adam Barnett and Nigel P. Smart; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using a link metric to improve communication mechanism and real-time properties in an adaptive middleware for heterogeneous sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 422-431 |
Author: Edison Pignaton de Freitas; Tales Heimfarth; Marco Aurelio Wehrmeister...[et.al]; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisis pola adopsi teknologi WI-FI berdasarkan mobile phone technology adoption model (Moptam) dengan pendekatan structural equation modeling (SEM) |
Author: Fani Jasmine Bahar; | Call Number: SK-0817 (Softcopy SK-299) Source code SK-266 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Skema IBE (Identity-Based Encryption Sakai-Kashara menggunakan tate pairing dan iplementasinya |
Author: Anthony; | Call Number: SK-1501 (Softcopy SK-983) | Edition: Lim Yohanes Stefanus | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
WAPI Secure Access Authentication Scheme for Heterogeneous Network Based on Identity-Based Cryptograph (130-135) |
Author: FENG Tao
JIAO Jian; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet cryptography |
Author: Smith, Richard E.; | Call Number: 005.82 Smi i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography: a primer |
Author: Konheim, Alan G.; | Call Number: 526 Kon c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|