Search Result Save to File Save as CSV
Your search for 38211 returns 4361 document(s)
Forward-secure signatures with fast key update, (LNCS-Lecture Notes in Computer Science 2576) Hal 241-256
Author: Anton Kozlov; Leonid Reyzin; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A New Notion of Soundness in bare public-key model, (LNCS-Lecture Notes in Computer Science 2576) Hal 318-325
Author: Shirley H.C. Cheung; Xiaotie Deng; C.H. Lee; Yunlei Zhao; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Generalized key-evolving signature schemes or how to foil an armed adversary, (LNCS-Lecture Notes in Computer Science 2576) Hal 151-168
Author: Gene Itkis; Peng Xie; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Computing the M=UU t integer matrix decomposition, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 223-233
Author: Katharina Geibler and Nigel P. Smart; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient distributed signcryption scheme as group signcryption, (LNCS-Lecture Notes in Computer Science 2576) Hal 403-417
Author: DongJin Kwak; SangJae Moon; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Metode pollard RHO dan aplikasinya pada penyelesaian IFP (Integer factorization problem) dan ECDLP (Elliptic curve discrete logarithm problem)/ Toni Sutomo
Author: Toni Sutomo; | Call Number: SK-0593 (Softkopi SK-72) Sourcode SK-15 | Edition: L. Yohanes,Stefanus | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Public Key Cryptosystem based on Pell's Equation Using The Gnu Mp Library (643-648
Author: K V S S R S S Sarma P S Avadhani; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
An improved pseudorandom generator based on hardness of factoring, (LNCS-Lecture Notes in Computer Science 2576) Hal 88-101
Author: Nenad Dedic; Leonid Reyzin; Salil Vadhan; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A ring signature scheme based on the nyberg-rueppel signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 169-175
Author: Chong-zhi Gao; Zheng-an Yao; Lei Li; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next