Search Result
Save to File
Your search for
38224
returns
3688
document(s)
Does it need trusted third party? design of buyyer-seller watermarking protocol without trusted third party, (LNCS-Lecture Notes in Computer Science 2576) Hal 265-279
Author: Jae-Gwi Choi; Kouichi Sakurai; Ji-Hwan Park; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
A Framework for Evaluating Third-Party Logistics
Author: Ganesh Vaidyanathan | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan fitur revoke access tokem on third party apps pada Pt. Bukalapak.com
Author: Putra Mutaqin; | Call Number: KP-2743 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Secure multi-party computation made simple, (LNCS-Lecture Notes in Computer Science 2576) Hal 14-28
Author: Ueli Maurer; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Platform or Wholesale? A Strategic Tool for Online Retailers to Benefit from Third-Party Information, Page 763-785
Author: Young Kwark, Jianqing Chen, and Srinivasan Raghunathan | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Multy-party Computation from any linear secret sharing scheme unconditionally secure againts adaptive adversary: the zero-error case, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-15
Author: Ventzislav Nikov; Svetla Nikova; Bart Preneel; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Secure multi-party computation using virtual parties for computation on encrypted data, (LNCS-Lecture Notes in Computer Science 5576) Hal. 412-421
Author: Rohit Pathak; Satyadhar Joshi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Java an introduction to computer science & programming third ed.
Author: Savitch Walter; | Call Number: 005.133 Sav j | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The trusted OS makes a comeback, page 16
Author: Sandra Miller | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
The Trusted PC: skin-deep security, page 103
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next