Search Result Save to File Save as CSV
Your search for 38168 returns 2778 document(s)
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Performance analysis of digital secure voice transmission over HF radio channel, (LNCS-Lecture Notes in Computer Science 5576) Hal. 337-346
Author: Kihong Kim; Jinkeun Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secure multi-party computation using virtual parties for computation on encrypted data, (LNCS-Lecture Notes in Computer Science 5576) Hal. 412-421
Author: Rohit Pathak; Satyadhar Joshi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A secure group rekeying scheme with compromised node revocation in wireless sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 712-721
Author: Asma Khalid; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On probability of success in linear and differential Cryptanalysis, (LNCS-Lecture Notes in Computer Science 2576) Hal 174-185
Author: Ali Aydin Selcuk; Ali Bicak; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Differential cryptanalysis of a reduced-round SEED, (LNCS-Lecture Notes in Computer Science 2576) Hal 186-198
Author: Hitoshi Yanami; Takeshi Shimoyama; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Differential-linear cryptanalysis of serpent, (LNCS-Lecture Notes in Computer Science 2887) Hal 9-21
Author: Eli Biham; Orr Dunkelman; Nathan Keller; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis of block ciphers based on sha-1 and md5, (LNCS-Lecture Notes in Computer Science 2887) Hal 36-44
Author: Markku-Juhani O. Saarinen; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Relationship between motivation and satisfaction of online computer games: evidence from adolsescent players using wireless service in Taiwan, (LNCS-Lecture Notes in Computer Science 5576) Hal. 541-552
Author: Lily Shui-Lien Chen; Michael Chih-Hung Wang; Yung Hsin Lee; | Call Number: 005.3 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A key recovery mechanism for reliable group key management, (LNCS-Lecture Notes in Computer Science 2576) Hal 372-386
Author: Taenam Cho; Sang-Ho Lee; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next