Search Result Save to File Save as CSV
Your search for 37623 returns 3747 document(s)
Using Coo-occurence, augmented restrictions, and C-E WordNet for Chinese-English Cross-Language Information Retrieval at ClEF 2001, (LNCS-Lecture Notes in Computer Science 2406) , Hal. 111-117
Author: Wen-Cheng Lin and Hsi Chen; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The dark side of timed opacity,(LNCS-Lecture Notes in Computer Science 5576) Hal. 21-30
Author: Frank Cassez; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Certificateless signature scheme without random oracles,(LNCS-Lecture Notes in Computer Science 5576) Hal. 31-40
Author: Vineela Muppavarapu ad Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Grouping provenance information to improve efficiency of access control, (LNCS-Lecture Notes in Computer Science 5576) Hal. 51-59
Author: Amril Syalim; Yoshiaki; Konichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Tagging the turtle: local attestation for kiosk computing, (LNCS-Lecture Notes in Computer Science 5576) Hal. 60-69
Author: Ronald Toegl; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Formal verification for access control in web information sharing system, (LNCS-Lecture Notes in Computer Science 5576) Hal. 80-89
Author: Akihiro Sakai; Yoshiaki Hori; Kouichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A New strongly secure authenticated key exchange protocol, (LNCS-Lecture Notes in Computer Science 5576) Hal. 135-144
Author: Qingfeng Cheng; Chuangui Ma, and Xuexian Hu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Improved implementations of cryptosystems based on tate pairing, (LNCS-Lecture Notes in Computer Science 5576) Hal. 145-158
Author: Chang An Zhao; Dongqing Xie; Fangguo Zhang; Chong Zhi Gao; Jingwei Zhang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Clustering-based frequency i-diversity anonymization,(LNCS-Lecture Notes in Computer Science 5576) Hal. 159-168
Author: Mohammad Reza; Zare-Mirakabad; Aman Jantan; Stephane Bressan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next