Your search for 37645 returns 4103 document(s) |
Java-based internet biometric authentication system, page 1166 |
Author: R.A.J. Everitt | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Improved CRT-based broadcast authentication scheme in WSNs, hal. 47-50 |
Author: Yunjie Zhu, YuShen; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Converged PKI-Based Authorization,Authentication Management and Delegation for an E-Business |
Author: Mani Anand K.P,Narayanasamy P; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Effient model checking of network authentication protocol based on SPIN, 100-104 |
Author: Zhi-hua Tan, Da-fang Zang, Li MIAO, Dan Zhao; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trust-based security in pervasive computing environments, page 154 |
Author: Lalana Kagal | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trust based intrusion detection scheme for secure data transfer, HAL. 651-658 |
Author: Shabana Mehfuz and M.N. Doja; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Influence Factor Analysis on Stability of Comunication Links Based on Cluster Tree WSN Using ZigBee (V2-69--V2-71) |
Author: Yuan Xu
Xiyuan Chen; | Call Number: SEM-328 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
WAPI Secure Access Authentication Scheme for Heterogeneous Network Based on Identity-Based Cryptograph (130-135) |
Author: FENG Tao
JIAO Jian; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Relationship between motivation and satisfaction of online computer games: evidence from adolsescent players using wireless service in Taiwan, (LNCS-Lecture Notes in Computer Science 5576) Hal. 541-552 |
Author: Lily Shui-Lien Chen; Michael Chih-Hung Wang; Yung Hsin Lee; | Call Number: 005.3 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer networks |
Call Number: [1 (1976): 1-6, 2 (1978): 2-6, 3 (1979): 1-6, 4 (1980): 1-6, 7 (1983): 1-6, 8 (1984): 2-6] | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|