Search Result Save to File Save as CSV
Your search for 37657 returns 3426 document(s)
Predicting the inversive generator, LNCS-Lecture Notes in Computer Science 2898), hal. 264-275
Author: Simon R. Blakburn; Domingo Gomez-Peres; Jaime Gutierez and Igor E. F. Shparlinski; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Mental poker revisited, LNCS-Lecture Notes in Computer Science 2898), Hal. 370-383
Author: Adam Barnett and Nigel P. Smart; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using a link metric to improve communication mechanism and real-time properties in an adaptive middleware for heterogeneous sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 422-431
Author: Edison Pignaton de Freitas; Tales Heimfarth; Marco Aurelio Wehrmeister...[et.al]; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Directed tracing to detect race conditions, Hal. II.247-II.250
Author: Emmi Schatz; Barbara G. Ryder; | Call Number: SEM-155 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Dynamic scheduling on a network heterogenous computer system, (LNCS-Lecture Notes in Computer Science 1557) Hal 584-585
Author: Janez Brest; Viljem Zumer; Milan Ojstersek; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
CAVEAT: technique and tool for computer aided verification and transformation, (LNCS-Lecture Notes in Computer Science 939) Hal 70-83
Author: E. Pascal Gribomont; Didier Rossetto; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Intrusion Detection Systems/ Dony Ariyus
Author: Ariyus, Dony; | Call Number: 004.65 Ari i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Some application of polynomials for the design of cryptographic protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-13
Author: Eyal Kushilevitz; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secure multi-party computation made simple, (LNCS-Lecture Notes in Computer Science 2576) Hal 14-28
Author: Ueli Maurer; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Forward secrecy in password-only key exchange protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 29-44
Author: Jonathan Katz; Rafail Ostrovsky; Moti Yung; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   13 14 15 16 17 18 19 20 21 22  Next