Your search for 38167 returns 5224 document(s) |
Hardware-based random number generation in wireless sensor(WSNs), (LNCS-Lecture Notes in Computer Science 5576) Hal 732-740 |
Author: Rabia Latif; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Authenticated encryption in WSN using eSTREAM ciphers, (LNCS-Lecture Notes in Computer Science 5576) Hal 741-749 |
Author: Shakil Ahmad; Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Device authentication/ authorization protocol for home network in next generation security, (LNCS-Lecture Notes in Computer Science 5576) Hal 760-768 |
Author: Jong Sik Moon; Deok Gyu Lee; Im-Yeong Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Free-form deformation axis aligned bounding box, (LNCS-Lecture Notes in Computer Science 5576) Hal 804-813 |
Author: Sunhwa Jung; Min Hong; Min-Hyung Choi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Challlenges in fixpoint computation with multisets, LNCS-Lecture Notes in Computer Science 5576), Hal. 273-301 |
Author: Nematollaah Shiri and Zhi Zheng; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A New approach to malware detection, (LNCS-Lecture Notes in Computer Science 5576) Hal. 229-238 |
Author: Hongying Tang; Bo Zhu; Kui Ren; | Call Number: 005.3 Adv | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Naïve Analysis of Food Web Dynamics: A Study of Causal Judgement About Complex Physical Systems, page 605-650 |
Author: Peter A. White | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Real life, real users, and real needs: a study and analysis of user queries on the web, page 207 |
Author: Bernard J. Jansen | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Recognizing partially occluded faces from a sungle exemplar image per person, (LNCS-Lecture Notes in Computer Science 5576) Hal. 100-109 |
Author: Hamidreza Rashidy Kanan; M. Shhram Moin; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134 |
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|