Search Result Save to File Save as CSV
Your search for 38544 returns 2703 document(s)
Practical symmetric on-line encryption, (LNCS-Lecture Notes in Computer Science 2887) Hal 362-375
Author: Pierre-Alain Forque; Gwenaelle Martinet; Guillaume Poupard; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Helix: Fast encryption and authentication single cryptographic primitive, (LNCS-Lecture Notes in Computer Science 2887) Hal 330-346
Author: Niels Ferguson; Doug Whiting; Bruce Schneier; John Kelsey; Stefan Lucks; Tadayoshi Kohno; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Authenticated encryption in WSN using eSTREAM ciphers, (LNCS-Lecture Notes in Computer Science 5576) Hal 741-749
Author: Shakil Ahmad; Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient re-keying protocols for multicast encryption, (LNCS-Lecture Notes in Computer Science 2576) Hal 119-132
Author: Giovanni Di Crescenzo; Olga Kornievskaia; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Single-chip FPGA implementation of the advanced encryption standard algorithm, (LNCS-Lecture Notes in Computer Science 2147) Hal 152-161
Author: Maire McLoone; John V. McCanny; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
JBits implementations of the advanced encryption standard (Rijndael), (LNCS-Lecture Notes in Computer Science 2147) Hal 162-171
Author: Scott McMillan; Cameron Patterson; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Effecient zero-knowledge proofs for some practical graph problems, (LNCS-Lecture Notes in Computer Science 2576) Hal 290-302
Author: Yvo Desmedt; Yongge Wang; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Practical challenges for industrial formal verification tools, (LNCS-Lecture Notes in Computer Science 1254) Hal 1-2
Author: F. Erich Marschner; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Practical higher-order pattern unification with on-the-fly raising, (LNCS-Lecture Notes in Computer Science 3668) Hal 371-386
Author: Gopalan Nadathur; Natalie Linnell; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Performance Anlysis of the Symmetric Proxy Re-encryption Scheme (91-96)
Author: Rizky Putri meiliasari Amril Syalim Setiadi Yazid; | Call Number: SEM-373 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next