Search Result Save to File Save as CSV
Your search for 38167 returns 5292 document(s)
A ring signature scheme based on the nyberg-rueppel signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 169-175
Author: Chong-zhi Gao; Zheng-an Yao; Lei Li; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Modelling and evaluating trust relationships in mobile agents based systems, (LNCS-Lecture Notes in Computer Science 2576) Hal 176-190
Author: Ching Lin; Vijay Varadharajan; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An authorization model for e-consent requirement in a health care application, (LNCS-Lecture Notes in Computer Science 2576) Hal 191-205
Author: Chun Ruan; Vijay Varadharajan; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
PLI: a new framework to protect digital content for P2P networks, (LNCS-Lecture Notes in Computer Science 2576) Hal 206-216
Author: Guofei Gu; Bin B. Zhu; Shipeng Li; Shiyong Zhang; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Improved algebraic traitor tracing scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 217-227
Author: Chunyan Bai; Guiliang Feng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Common vulnerability markup language, (LNCS-Lecture Notes in Computer Science 2576) Hal 228-240
Author: Haitao Tian; Liusheng Huang; Zhi Zhou; Hui Zhang; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Security protocols for biometrics-based cardholder authentication in smartcards, (LNCS-Lecture Notes in Computer Science 2576) Hal 254-264
Author: Luciano Rila; Chris J. Mitchell; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using OCSP to secure certificate-using transactions in m-commerce, (LNCS-Lecture Notes in Computer Science 2576) Hal 280-292
Author: Jose L. Munoz; Jordi Forne; Oscar Esparza; Bernabe Miguel Soriano; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Side-Channel attack on substitution blocks, (LNCS-Lecture Notes in Computer Science 2576) Hal 307-318
Author: Roman Novak; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Timing attack against implementation of a parallel algorithm for modular exponentiation, (LNCS-Lecture Notes in Computer Science 2576) Hal 319-330
Author: Yasuyuki Sakai; Kouichi Sakurai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   21 22 23 24 25 26 27 28 29 30  Next