Your search for 37657 returns 3426 document(s) |
Predicting the inversive generator, LNCS-Lecture Notes in Computer Science 2898), hal. 264-275 |
Author: Simon R. Blakburn; Domingo Gomez-Peres; Jaime Gutierez and Igor E. F. Shparlinski; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Mental poker revisited, LNCS-Lecture Notes in Computer Science 2898), Hal. 370-383 |
Author: Adam Barnett and Nigel P. Smart; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using a link metric to improve communication mechanism and real-time properties in an adaptive middleware for heterogeneous sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 422-431 |
Author: Edison Pignaton de Freitas; Tales Heimfarth; Marco Aurelio Wehrmeister...[et.al]; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Directed tracing to detect race conditions, Hal. II.247-II.250 |
Author: Emmi Schatz; Barbara G. Ryder; | Call Number: SEM-155 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Dynamic scheduling on a network heterogenous computer system, (LNCS-Lecture Notes in Computer Science 1557) Hal 584-585 |
Author: Janez Brest; Viljem Zumer; Milan Ojstersek; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CAVEAT: technique and tool for computer aided verification and transformation, (LNCS-Lecture Notes in Computer Science 939) Hal 70-83 |
Author: E. Pascal Gribomont; Didier Rossetto; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Intrusion Detection Systems/ Dony Ariyus |
Author: Ariyus, Dony; | Call Number: 004.65 Ari i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Some application of polynomials for the design of cryptographic protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-13 |
Author: Eyal Kushilevitz; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure multi-party computation made simple, (LNCS-Lecture Notes in Computer Science 2576) Hal 14-28 |
Author: Ueli Maurer; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Forward secrecy in password-only key exchange protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 29-44 |
Author: Jonathan Katz; Rafail Ostrovsky; Moti Yung; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|