Search Result Save to File Save as CSV
Your search for 38832 returns 3876 document(s)
A Multifunctional turbo-based receiver using partial unit memory codes, (LNCS-Lecture Notes in Computer Science 2898), Hal. 24-34
Author: Lina Pagoonee and Bahran Honary; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 167-182
Author: Dae Hyun Yum and Pil Joong Lee; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A General attack model on hash-based client puzzles, (LNCS-Lecture Notes in Computer Science 2898),Hal. 319-331
Author: Geraint Price; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis of the public key cryptosystem based, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 234-244
Author: George Petricles; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Parallelizing the mur verifier, (LNCS-Lecture Notes in Computer Science 1254) Hal 256-267
Author: Ulrich Stern; David L. Dill; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
UPPAAL: status & developments, (LNCS-Lecture Notes in Computer Science 1254) Hal 456-459
Author: Kim G Larsen; Paul Pettersson; Wang Yi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The PEP tool, LNCS-Lecture Notes in Computer Science 1254) Hal 442-443
Author: Bernd Grahlmann; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Module checking revisited, (LNCS-Lecture Notes in Computer Science 1254) Hal 36-47
Author: Orna Kupferman; Moshe Y. Vardi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Key-insulated encryption based key pre-distribution scheme fo WSN, (LNCS-Lecture Notes in Computer Science 5576) Hal. 200-209
Author: Weidong Qiu; Yaowei Zhou; Bo Zhu; Yanfei Zheng; Mi Wen; Zheng Gong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next