Your search for 38194 returns 2581 document(s) |
How to repair ESIGN,(LNCS-Lecture Notes in Computer Science 2576) Hal 234-240 |
Author: Louis Granboulan; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Generalized key-evolving signature schemes or how to foil an armed adversary, (LNCS-Lecture Notes in Computer Science 2576) Hal 151-168 |
Author: Gene Itkis; Peng Xie; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Repair-based methods for quantified CSPs, (LNCS-Lecture Notes in Computer Science 3709) Hal 652-666 |
Author: Kostas Stergiou; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Database repair by signed fomulae, LNCS-Lecture Notes in Computer Science 2942), Hal. 14-30 |
Author: Ofer Arieli; Marc Denecker; Berz Van Nuffelen and Maurice Bruynooghe; | Call Number: 006.33 Sei f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How to troubleshoot and repair microcomputers/John D. Lenk |
Author: Lenk, John P.; | Call Number: 621.391 6 Len h | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How to share a divisible load in a hypercube (extended abstract), (LNCS-Lecture Notes in Computer Science 1557) Hal 588-589 |
Author: Wlodzimierz Glazek; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How to build evidence in a public-key infrastructure for multi-domain environments, (LNCS-Lecture Notes in Computer Science 1361) Hal 53-65 |
Author: Bruno Crispo; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How to convert any digital signature scheme into a group signature scheme, (LNCS-Lecture Notes in Computer Science 1361) Hal 177-190 |
Author: Holger Petersen; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Open key exchange: how to defeat dictionary attacks without encrypting public keys, (LNCS-Lecture Notes in Computer Science 939) Hal 79-90 |
Author: Stefan Lucks; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Reduction Zero-Knowledge, (LNCS-Lecture Notes in Computer Science 2576) Hal 303-317 |
Author: Xiaotie Deng; C.H.Lee; Yunlei Zhao; Hong Zhu; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|