Your search for 37653 returns 4072 document(s) |
Certificateless signature scheme without random oracles,(LNCS-Lecture Notes in Computer Science 5576) Hal. 31-40 |
Author: Vineela Muppavarapu ad Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A study on feasibility and establishment of a security grade certification scheme for the new IT services, (LNCS-Lecture Notes in Computer Science 5576) Hal 769-777 |
Author: Hangbae Chang; Jonggu Kang; Hyukjun Kwon; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Efficient Bit Allocation for Compressing Normal Meshes with An Error-Driven Quantization, page 466-486 |
Author: F. Payan, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Bit Error Rate Measurement of Wireless Systems Employing NCFSK Modulation with Fast Frequency Hopping and Diversity Technique (45) |
Author: Abid Yahya
Farid Ghani
Madhya Othman Sidek; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Multy-party Computation from any linear secret sharing scheme unconditionally secure againts adaptive adversary: the zero-error case, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-15 |
Author: Ventzislav Nikov; Svetla Nikova; Bart Preneel; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Bit by bit : an illustrated history of computers/ Stan Augarten |
Author: Augarten, Stan; | Call Number: 004 Aug b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Bit-slice microprocessor design |
Author: Mick, John; | Call Number: 621.392 Mic b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50 |
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Grouping provenance information to improve efficiency of access control, (LNCS-Lecture Notes in Computer Science 5576) Hal. 51-59 |
Author: Amril Syalim; Yoshiaki; Konichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79 |
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|