Your search for 38178 returns 3914 document(s) |
SG logic - a formal analysis technique for authentication protocols, (LNCS-Lecture Notes in Computer Science 1361) Hal 159-176 |
Author: Sigrid Gurgens; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Formalization and verification of interaction protocols, ((LNCS-Lecture Notes in Computer Science 3668) Hal 437-438 |
Author: Federico Chesani; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tripartite authenticated key agreement protocols from pairings, (LNCS-Lecture Notes in Computer Science 2898), Hal. 332-344 |
Author: S.S. Al. Riyami and K.G. Pterson; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Some connections between iterative programs, recursive programs, and first-order logic, (LNCS-Lecture Notes in Computer Science 131) Hal. 150-166 |
Author: A.J. Kfoury; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Application of 2D barcode in hardcopy document verification system,(LNCS-Lecture Notes in Computer Science 5576) Hal 644-651 |
Author: Mazleena Salleh; Teoh Chin Yew; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Random stimuli generation for functional hardware verification as a CP application, (LNCS-Lecture Notes in Computer Science 3709) Hal 882 |
Author: Yehuda Naveh, Roy Emek; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A generator of efficient abstract machine implementations and its application to emulator minimization, (LNCS-Lecture Notes in Computer Science 3668) Hal 21-36 |
Author: Jose F. Morales; Manuel Carro; German Puebla; Manuel V. Hermenegildo; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134 |
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Design validation of computer protocols/ Gerard J. Holzman |
Author: Holzman, Gerad J.; | Call Number: 004.62 | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Cryptanalytic view of the NSA's skipjack block cipher design, (LNCS-Lecture Notes in Computer Science 5576) Hal. 368-381 |
Author: Jongsung Kim; Raphael C.W. Phan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|