Search Result Save to File Save as CSV
Your search for 38178 returns 3914 document(s)
SG logic - a formal analysis technique for authentication protocols, (LNCS-Lecture Notes in Computer Science 1361) Hal 159-176
Author: Sigrid Gurgens; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Formalization and verification of interaction protocols, ((LNCS-Lecture Notes in Computer Science 3668) Hal 437-438
Author: Federico Chesani; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Tripartite authenticated key agreement protocols from pairings, (LNCS-Lecture Notes in Computer Science 2898), Hal. 332-344
Author: S.S. Al. Riyami and K.G. Pterson; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Some connections between iterative programs, recursive programs, and first-order logic, (LNCS-Lecture Notes in Computer Science 131) Hal. 150-166
Author: A.J. Kfoury; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Application of 2D barcode in hardcopy document verification system,(LNCS-Lecture Notes in Computer Science 5576) Hal 644-651
Author: Mazleena Salleh; Teoh Chin Yew; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Random stimuli generation for functional hardware verification as a CP application, (LNCS-Lecture Notes in Computer Science 3709) Hal 882
Author: Yehuda Naveh, Roy Emek; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A generator of efficient abstract machine implementations and its application to emulator minimization, (LNCS-Lecture Notes in Computer Science 3668) Hal 21-36
Author: Jose F. Morales; Manuel Carro; German Puebla; Manuel V. Hermenegildo; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Design validation of computer protocols/ Gerard J. Holzman
Author: Holzman, Gerad J.; | Call Number: 004.62 | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Cryptanalytic view of the NSA's skipjack block cipher design, (LNCS-Lecture Notes in Computer Science 5576) Hal. 368-381
Author: Jongsung Kim; Raphael C.W. Phan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next