Your search for 38715 returns 2930 document(s) |
Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting, (LNCS-Lecture Notes in Computer Science 5576) Hal 797-803 |
Author: Song-Hee Lee; Nam-Sup Park; Soo Kyun Kim; Jin-Young Choi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Some connections between iterative programs, recursive programs, and first-order logic, (LNCS-Lecture Notes in Computer Science 131) Hal. 150-166 |
Author: A.J. Kfoury; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Selecting the wireless communication methods for establishing ubiquitous city-gas facilities in Korea, (LNCS-Lecture Notes in Computer Science 5576) Hal 823-828 |
Author: Jeong Seok Oh; Jang Sik Park; Jeong Rock Kwon; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Choosing rendering parameters for effective communication of 3D shape, page 20 |
Author: James C. Corbett | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security evaluation of an infrusion tolerant web service architecture using stochastic activity networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10Hal. 260-269 |
Author: Zahra Aghajani; Mohammad Abdollahi Azgomi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Energy lesser broadcasting algorithms using adjustable transmission ranges in mobile ad hoc networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 502-511 |
Author: Toshihiko Sasama; Yashiro Abe; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A multi-path routing supported scheduling algorithm for multi-channel single-transceiver wireles mesh networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 512-521 |
Author: Chen Mei-Jhen; Yu Gwo-Jong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701 |
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A secure group rekeying scheme with compromised node revocation in wireless sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 712-721 |
Author: Asma Khalid; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Relationship between motivation and satisfaction of online computer games: evidence from adolsescent players using wireless service in Taiwan, (LNCS-Lecture Notes in Computer Science 5576) Hal. 541-552 |
Author: Lily Shui-Lien Chen; Michael Chih-Hung Wang; Yung Hsin Lee; | Call Number: 005.3 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|