Search Result Save to File Save as CSV
Your search for 38320 returns 4491 document(s)
Combining constraint solving and symbolic model checking for a class of systems with non-linear constraints, (LNCS-Lecture Notes in Computer Science 1254) Hal 316-327
Author: William Chan; Richard Anderson; Paul Beame; David Notkin; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Combining constraint solving and symbolic model checking for a class of sysems with non-linear constraints, (LNCS-Lecture Notes in Computer Science 1254)Hal. 316-327
Author: William Chan; Richard Anderson; Paul Beanne; David Notkin; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Counterarcting phishing page polymorphims: an image layout analysis appraoch, (LNCS-Lecture Notes in Computer Science 5576) Hal. 270-279
Author: Ieng-Fat Lam; Wei-Cheng Xino; Szu-Chi Wang; Kuan Ta Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Energy analysis of multimedia video streaming on mobile devices, (LNCS-Lecture Notes in Computer Science 5576) Hal. 347-357
Author: Chu-Hsing LIn; Jung-Chun Liu; Mao-Hua Cheng; Tsung-Che Yang; Mei-Chun Chou; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A study of international trend analysis on web service vulnerabilities in OWASP and WASC, (LNCS-Lecture Notes in Computer Science 5576) Hal 788-796
Author: Soonseok Kim; Haeyoung Han; Donghwi Shin; Inkyung Jeun; HyunCheol Jeong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Differential fault analysis on A.E.S, (LNCS-Lecture Notes in Computer Science 2576) Hal 293-306
Author: Pierre Dusart; Gilles Letourneux; Olivier Vivolo; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Initial analysis of the proteus architecture, (LNCS-Lecture Notes in Computer Science 2147) Hal 623-627
Author: Michael Dales; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of involutional ciphers: khazad and anubis, (LNCS-Lecture Notes in Computer Science 2887) Hal 45-53
Author: Alex Biryukov; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Concrete security analysis for 3gpp-mac, (LNCS-Lecture Notes in Computer Science 2887) Hal 154-169
Author: Dowon Hong; Ju-Sung Kang; Bart Preneel; Heuisu Ryu; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A generic protection against high-order differential power analysis, (LNCS-Lecture Notes in Computer Science 2887) Hal 192-205
Author: Mehdi-Laurent Akkar; Louis Goubin; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   2 3 4 5 6 7 8 9 10 11  Next