Your search for 38168 returns 2778 document(s) |
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701 |
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Performance analysis of digital secure voice transmission over HF radio channel, (LNCS-Lecture Notes in Computer Science 5576) Hal. 337-346 |
Author: Kihong Kim; Jinkeun Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure multi-party computation using virtual parties for computation on encrypted data, (LNCS-Lecture Notes in Computer Science 5576) Hal. 412-421 |
Author: Rohit Pathak; Satyadhar Joshi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A secure group rekeying scheme with compromised node revocation in wireless sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 712-721 |
Author: Asma Khalid; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On probability of success in linear and differential Cryptanalysis, (LNCS-Lecture Notes in Computer Science 2576) Hal 174-185 |
Author: Ali Aydin Selcuk; Ali Bicak; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Differential cryptanalysis of a reduced-round SEED, (LNCS-Lecture Notes in Computer Science 2576) Hal 186-198 |
Author: Hitoshi Yanami; Takeshi Shimoyama; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Differential-linear cryptanalysis of serpent, (LNCS-Lecture Notes in Computer Science 2887) Hal 9-21 |
Author: Eli Biham; Orr Dunkelman; Nathan Keller; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of block ciphers based on sha-1 and md5, (LNCS-Lecture Notes in Computer Science 2887) Hal 36-44 |
Author: Markku-Juhani O. Saarinen; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Relationship between motivation and satisfaction of online computer games: evidence from adolsescent players using wireless service in Taiwan, (LNCS-Lecture Notes in Computer Science 5576) Hal. 541-552 |
Author: Lily Shui-Lien Chen; Michael Chih-Hung Wang; Yung Hsin Lee; | Call Number: 005.3 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A key recovery mechanism for reliable group key management, (LNCS-Lecture Notes in Computer Science 2576) Hal 372-386 |
Author: Taenam Cho; Sang-Ho Lee; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|