Your search for 38832 returns 3876 document(s) |
A Multifunctional turbo-based receiver using partial unit memory codes, (LNCS-Lecture Notes in Computer Science 2898), Hal. 24-34 |
Author: Lina Pagoonee and Bahran Honary; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 167-182 |
Author: Dae Hyun Yum and Pil Joong Lee; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A General attack model on hash-based client puzzles, (LNCS-Lecture Notes in Computer Science 2898),Hal. 319-331 |
Author: Geraint Price; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of the public key cryptosystem based, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 234-244 |
Author: George Petricles; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Parallelizing the mur verifier, (LNCS-Lecture Notes in Computer Science 1254) Hal 256-267 |
Author: Ulrich Stern; David L. Dill; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
UPPAAL: status & developments, (LNCS-Lecture Notes in Computer Science 1254) Hal 456-459 |
Author: Kim G Larsen; Paul Pettersson; Wang Yi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The PEP tool, LNCS-Lecture Notes in Computer Science 1254) Hal 442-443 |
Author: Bernd Grahlmann; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Module checking revisited, (LNCS-Lecture Notes in Computer Science 1254) Hal 36-47 |
Author: Orna Kupferman; Moshe Y. Vardi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What about vulnerability to a fault attack of the miller's algorithm during an identify based protocols, (LNCS-Lecture Notes in Computer Science 5576) Hal. 122-134 |
Author: Nadia El Mrabet; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Key-insulated encryption based key pre-distribution scheme fo WSN, (LNCS-Lecture Notes in Computer Science 5576) Hal. 200-209 |
Author: Weidong Qiu; Yaowei Zhou; Bo Zhu; Yanfei Zheng; Mi Wen; Zheng Gong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|