Your search for 38168 returns 2814 document(s) |
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158 |
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Threshold key-recovery systems for RSA, (LNCS-Lecture Notes in Computer Science 1361) Hal 191-200 |
Author: Tatsuaki Okamoto; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 167-182 |
Author: Dae Hyun Yum and Pil Joong Lee; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tripartite authenticated key agreement protocols from pairings, (LNCS-Lecture Notes in Computer Science 2898), Hal. 332-344 |
Author: S.S. Al. Riyami and K.G. Pterson; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Constraint-based inference: a bridge between constraint processing and probability inference, (LNCS-Lecture Notes in Computer Science 3709) Hal 844 |
Author: Le Chang; Alan K. Mackworth; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Interaction between PVM parameters and communication performances on ATM networks, (LNCS-Lecture Notes in Computer Science 1557) Hal 586-587 |
Author: Maurizio Giordano; Mario Mango Furnari; Francesco Vitobello; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure multi-party computation made simple, (LNCS-Lecture Notes in Computer Science 2576) Hal 14-28 |
Author: Ueli Maurer; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using OCSP to secure certificate-using transactions in m-commerce, (LNCS-Lecture Notes in Computer Science 2576) Hal 280-292 |
Author: Jose L. Munoz; Jordi Forne; Oscar Esparza; Bernabe Miguel Soriano; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure configuration of field programmable gate arrays, (LNCS-Lecture Notes in Computer Science 2147) Hal 142-151 |
Author: Tom Kean; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure books: protecting the distribution of knowledge, (LNCS-Lecture Notes in Computer Science 1361) Hal 1-11 |
Author: Ross J Anderson; Vaclav Matyas Jr; Fabien A Petitcolas; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|