Search Result Save to File Save as CSV
Your search for 38164 returns 3524 document(s)
Random stimuli generation for functional hardware verification as a CP application, (LNCS-Lecture Notes in Computer Science 3709) Hal 882
Author: Yehuda Naveh, Roy Emek; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Automating the generation and sequencing of test cases from model-based specifications, (LNCS-Lecture Notes in Computer Science 670) Hal 268-284
Author: Jeremy Dick; Alain Faivre; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Automating text case generation from Z specifications with isabelle, (LNCS-Lecture Notes in Computer Science 1212)Hal. 52-72
Author: Steffen Helke; Thomas Neustupny; Thomas Santen; | Call Number: 005.133 Bow z | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Security Challenges in Wireless Mesh Network Deployment and User Authentication (EAP) Method (V1-333 -- V1-337)
Author: Min Lin Shaoyong Chen; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A system on chip for power line communications according to european home systems specifications, (LNCS-Lecture Notes in Computer Science 2147) Hal 658-662
Author: Isidoro Urriza; Jose I. Garcia-Nicolas; Alfredo Sanz; Antonio Valdovinos; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Converged PKI-Based Authorization,Authentication Management and Delegation for an E-Business
Author: Mani Anand K.P,Narayanasamy P; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Call for the Home Media Network
Author: Gordon Bell, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Weak forward security in mediated RSA, (LNCS-Lecture Notes in Computer Science 2576) Hal 45-54
Author: Gene Tsudik; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Concrete security analysis for 3gpp-mac, (LNCS-Lecture Notes in Computer Science 2887) Hal 154-169
Author: Dowon Hong; Ju-Sung Kang; Bart Preneel; Heuisu Ryu; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next