Search Result Save to File Save as CSV
Your search for 38817 returns 2531 document(s)
Verification of coccurent program temporal proof principles, (LNCS-Lecture Notes in Computer Science 131) Hal. 200- 252
Author: Zohar Manna; Amir Pneuli; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A New strongly secure authenticated key exchange protocol, (LNCS-Lecture Notes in Computer Science 5576) Hal. 135-144
Author: Qingfeng Cheng; Chuangui Ma, and Xuexian Hu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Forward-secrecy WTLS handshake protocol based on XTR, (LNCS-Lecture Notes in Computer Science 5576) Hal 635-643
Author: Bin Li; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Device authentication/ authorization protocol for home network in next generation security, (LNCS-Lecture Notes in Computer Science 5576) Hal 760-768
Author: Jong Sik Moon; Deok Gyu Lee; Im-Yeong Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Reconfigurable router modules using network protocol wrappers, (LNCS-Lecture Notes in Computer Science 2147) Hal 254-263
Author: Florian Braun; John Lockwood; Marcel Waldvogel; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
PS-LTL for constraint-based security protocol analysis, (LNCS-Lecture Notes in Computer Science 3668) Hal 439-440
Author: Ricardo Corin; Ari Saptawijaya; Sandro Etalle; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Modelling a time-dependent protocol using the circal process algebra, (LNCS-Lecture Notes in Computer Science 1201) Hal 124-138
Author: Antonio Cerone; Alex J. Cowie; George J. Milne; Philip A. Moseley; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Automated analysis of an audio control protocol, (LNCS-Lecture Notes in Computer Science 939) Hal 381-394
Author: Pei-Hsin Ho; Howard Wong-Toi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Towards automated verification of database scripts
Author: Ade Azurat; I.S.W.B. Prasetya; T.E.J. Vos; H.Suhartanto; B. Widjaja, L.Y. Stefanus; Ricky Wenang; S. Aminah; Jimmy Bong | Call Number: Pub.Staf-PI-0044 | Type: Prosiding Internasional
Find Similar |  Add To Favorites |  Detail in New Window 
A VDM study of fault-tolerant stable storage towards a computer engineering mathematics,(LNCS-Lecture Notes in Computer Science 670) Hal 216-234
Author: Andrew Butterfield; | Call Number: 004 Woo f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next