Your search for 37620 returns 2929 document(s) |
Performance analysis of digital secure voice transmission over HF radio channel, (LNCS-Lecture Notes in Computer Science 5576) Hal. 337-346 |
Author: Kihong Kim; Jinkeun Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure multi-party computation using virtual parties for computation on encrypted data, (LNCS-Lecture Notes in Computer Science 5576) Hal. 412-421 |
Author: Rohit Pathak; Satyadhar Joshi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A reliable and efficient pedal back data disseminating scheme for Ad-Hoc WSNs, (LNCS-Lecture Notes in Computer Science 5576) Hal. 450-460 |
Author: Nomica Imran; A.I. Khan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A multi-path routing supported scheduling algorithm for multi-channel single-transceiver wireles mesh networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 512-521 |
Author: Chen Mei-Jhen; Yu Gwo-Jong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Error control scheme of hybrid ARQ based on majority voting bit by bit, (LNCS-Lecture Notes in Computer Science 5576) Hal. 563-569 |
Author: Hsin-Kun Lai, Chia-Chin Ma, Eri-Huel Lu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CRYPTEX model for E-commercial contract of software source code using secrete sharing scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal 662-671 |
Author: ByungRae Cha; Youngil KIM; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A comparative analysis of HC-128 and rabbit encryption schemes for pervasive computing in WSN environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 682-691 |
Author: Firdous Kausar; Ayesha Naureen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701 |
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A secure group rekeying scheme with compromised node revocation in wireless sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 712-721 |
Author: Asma Khalid; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Aggregate and verifiably encrypted signatures from multilinear maps without random oracles, (LNCS-Lecture Notes in Computer Science 5576) Hal 750-759 |
Author: Markus Ruckert; Dominique Schroder; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|