Your search for 38157 returns 6414 document(s) |
Analysis of rmac, (LNCS-Lecture Notes in Computer Science 2887) Hal 182-191 |
Author: Lars R. Knudsen; Tadayoshi Kohno; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hierarchical block matching motion estimation on a hypercube multiprocessor, (LNCS-Lecture Notes in Computer Science 1557) Hal 265-275 |
Author: Charalampos Konstantopoulos; Andreas Svolos; Christos Kaklamanis; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hierarchical hybrid control: a case study, (LNCS-Lecture Notes in Computer Science 999) Hal. 166-190 |
Author: Datta N. Gondhole; John Lygeros and Shankar Sastry; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Forward secrecy in password-only key exchange protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 29-44 |
Author: Jonathan Katz; Rafail Ostrovsky; Moti Yung; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On a class of key agreement protocols which cannot be unconditionally secure, (LNCS-Lecture Notes in Computer Science 2576) Hal 133-145 |
Author: Frank Niedermeyer; Werner Schindler; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A group key distribution scheme with decentralised user join, (LNCS-Lecture Notes in Computer Science 2576) Hal 146-163 |
Author: Hartono Kurnio; Rei Safavi-Naini; Huaxiong Wang; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Forward-secure signatures with fast key update, (LNCS-Lecture Notes in Computer Science 2576) Hal 241-256 |
Author: Anton Kozlov; Leonid Reyzin; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A New Notion of Soundness in bare public-key model, (LNCS-Lecture Notes in Computer Science 2576) Hal 318-325 |
Author: Shirley H.C. Cheung; Xiaotie Deng; C.H. Lee; Yunlei Zhao; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Omac: one-key cbc mac, (LNCS-Lecture Notes in Computer Science 2887) Hal 129-153 |
Author: Tetsu Iwata; Kaoru Kurosawa; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Optimal key ranking procedures in a statistical cryptanalysis, (LNCS-Lecture Notes in Computer Science 2887) Hal 235-246 |
Author: Pascal Junod; Serge Vaudenay; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|