Search Result Save to File Save as CSV
Your search for 38178 returns 3940 document(s)
Efficient distributed signcryption scheme as group signcryption, (LNCS-Lecture Notes in Computer Science 2576) Hal 403-417
Author: DongJin Kwak; SangJae Moon; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Architectural enhancements for montgomery multiplication on embedded RISC processors, (LNCS-Lecture Notes in Computer Science 2576) Hal 418-434
Author: Johann Grorschadl; Guy-armand Kamendje; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to computer systems: analysis, design and application
Author: Aseltine, John A; | Call Number: 004 Ase i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer networks and their protocols
Author: Davies, D.W.; | Call Number: 004.6 Dav c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Signature files: design and perfomance comparison of some signature extraction methods (63-83)
Author: Chris faloutsos; | Call Number: SEM-357 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Intrusion-resilient signatures: generic constructions, or defeating strong adversary with minimal assumptions, (LNCS-Lecture Notes in Computer Science 2576) Hal 102-118
Author: Gene Itkis; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient presentation of multivariate audit data for intrusion detection of web-based internet services, (LNCS-Lecture Notes in Computer Science 2576) Hal 63-75
Author: Zhi Guo; Kwok-Yan Lam; Siu-Leung Chung; Ming Gu; Jia-Guang Sun; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Round optimal distributed key generation of threshold cryptosystem based on discrete logarithm problem, (LNCS-Lecture Notes in Computer Science 2576) Hal 96-110
Author: Rui Zhang; Hideki Imai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Making the key agreement protocol in mobile ad hoc network more efficient, (LNCS-Lecture Notes in Computer Science 2576) Hal 343-356
Author: Gang Yao; Kui Ren; Feng Bao; Robert H.Deng; Dengguo Feng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Computer networking with internet protocols and technology
Author: Stallings William; | Call Number: 004.68 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next