Search Result Save to File Save as CSV
Your search for 38886 returns 2455 document(s)
Binding bit patterns to real world entities, (LNCS-Lecture Notes in Computer Science 1361) Hal 105-113
Author: Bruce Christianson; James A. Malcolm; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Low cost attacks on tamper resistant devices, (LNCS-Lecture Notes in Computer Science 1361) Hal 125-136
Author: Ross Anderson; Markus Kuhn; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
SG logic - a formal analysis technique for authentication protocols, (LNCS-Lecture Notes in Computer Science 1361) Hal 159-176
Author: Sigrid Gurgens; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A weakness of the menezes-vanstone cryptosystem, (LNCS-Lecture Notes in Computer Science 1361) Hal 201-206
Author: Klaus Kiefer; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults, (LNCS-Lecture Notes in Computer Science 1361) Hal 115-124
Author: F. Bao; R.H. Deng; Y. Hang; A. Jeng; A. D. Narasimhalu; T. Ngair; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Trojans, Worms, and spyware: a computer security professional's guide to malicious code
Author: Erbschloe, Michael; | Call Number: 005.84 Erb t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Update on seed seed-192/256, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10
Author: Kitae Jeong; Joongeun Choi; Yoseop Lee; Changhoon Lee; Jacchul Sung; Haeryong Park; Yeonjung Kang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Adaptive iris segmentation, (LNCS-Lecture Notes in Computer Science 5576) Hal. 90-99
Author: Rahib Abiyev; Kemal Kilic; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
How to repair ESIGN,(LNCS-Lecture Notes in Computer Science 2576) Hal 234-240
Author: Louis Granboulan; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next