Search Result Save to File Save as CSV
Your search for 38231 returns 3878 document(s)
Using OCSP to secure certificate-using transactions in m-commerce, (LNCS-Lecture Notes in Computer Science 2576) Hal 280-292
Author: Jose L. Munoz; Jordi Forne; Oscar Esparza; Bernabe Miguel Soriano; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Round optimal distributed key generation of threshold cryptosystem based on discrete logarithm problem, (LNCS-Lecture Notes in Computer Science 2576) Hal 96-110
Author: Rui Zhang; Hideki Imai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient presentation of multivariate audit data for intrusion detection of web-based internet services, (LNCS-Lecture Notes in Computer Science 2576) Hal 63-75
Author: Zhi Guo; Kwok-Yan Lam; Siu-Leung Chung; Ming Gu; Jia-Guang Sun; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient software implementation of LFSR and boolean function and its application in nonlinear combiner model, (LNCS-Lecture Notes in Computer Science 2576) Hal 387-402
Author: Sandeepan Chowdhury; Subhamoy Maitra; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using sat in qbf, (LNCS-Lecture Notes in Computer Science 3709) Hal 578-592
Author: Horst Samulowitz; Fahiem Bacchus; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A New strongly secure authenticated key exchange protocol, (LNCS-Lecture Notes in Computer Science 5576) Hal. 135-144
Author: Qingfeng Cheng; Chuangui Ma, and Xuexian Hu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Omac: one-key cbc mac, (LNCS-Lecture Notes in Computer Science 2887) Hal 129-153
Author: Tetsu Iwata; Kaoru Kurosawa; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Optimal key ranking procedures in a statistical cryptanalysis, (LNCS-Lecture Notes in Computer Science 2887) Hal 235-246
Author: Pascal Junod; Serge Vaudenay; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
How to build evidence in a public-key infrastructure for multi-domain environments, (LNCS-Lecture Notes in Computer Science 1361) Hal 53-65
Author: Bruno Crispo; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next