Search Result Save to File Save as CSV
Your search for 37620 returns 2905 document(s)
Toupie = u-calculus + constraints, (LNCS-Lecture Notes in Computer Science 939) Hal 114-126
Author: Antoine Rauzy; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Differential uniformity for arrays, (LNCS-Lecture Notes in Computer Science 2898), Hal. 115-124
Author: K.J. Horadam; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Predicting the inversive generator, LNCS-Lecture Notes in Computer Science 2898), hal. 264-275
Author: Simon R. Blakburn; Domingo Gomez-Peres; Jaime Gutierez and Igor E. F. Shparlinski; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Mental poker revisited, LNCS-Lecture Notes in Computer Science 2898), Hal. 370-383
Author: Adam Barnett and Nigel P. Smart; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using a link metric to improve communication mechanism and real-time properties in an adaptive middleware for heterogeneous sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 422-431
Author: Edison Pignaton de Freitas; Tales Heimfarth; Marco Aurelio Wehrmeister...[et.al]; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis pola adopsi teknologi WI-FI berdasarkan mobile phone technology adoption model (Moptam) dengan pendekatan structural equation modeling (SEM)
Author: Fani Jasmine Bahar; | Call Number: SK-0817 (Softcopy SK-299) Source code SK-266 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Skema IBE (Identity-Based Encryption Sakai-Kashara menggunakan tate pairing dan iplementasinya
Author: Anthony; | Call Number: SK-1501 (Softcopy SK-983) | Edition: Lim Yohanes Stefanus | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
WAPI Secure Access Authentication Scheme for Heterogeneous Network Based on Identity-Based Cryptograph (130-135)
Author: FENG Tao JIAO Jian; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Internet cryptography
Author: Smith, Richard E.; | Call Number: 005.82 Smi i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography: a primer
Author: Konheim, Alan G.; | Call Number: 526 Kon c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   11 12 13 14 15 16 17 18 19 20  Next