Search Result Save to File Save as CSV
Your search for 38897 returns 2310 document(s)
A weakness of the menezes-vanstone cryptosystem, (LNCS-Lecture Notes in Computer Science 1361) Hal 201-206
Author: Klaus Kiefer; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On a resynchronization weakness in a class of combiners with memory, (LNCS-Lecture Notes in Computer Science 2576) Hal 164-173
Author: Yuri Borissov; Svetla Nikova; Bart Preneel; Joos Vandewalle; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Minucode a fixed-value representation of fingerprint minutiae for biometric cryptosystem, (LNCS-Lecture Notes in Computer Science 5576) Hal. 382-391
Author: Jingyang Shi and Kwok Yan Lam; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Round optimal distributed key generation of threshold cryptosystem based on discrete logarithm problem, (LNCS-Lecture Notes in Computer Science 2576) Hal 96-110
Author: Rui Zhang; Hideki Imai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis of the public key cryptosystem based, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 234-244
Author: George Petricles; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Protocol interactions and the chosen protocol attack, LNCS-Lecture Notes in Computer Science 1361) Hal 91-104
Author: John Kelsey; Bruce Schneier; David Wagner; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secure books: protecting the distribution of knowledge, (LNCS-Lecture Notes in Computer Science 1361) Hal 1-11
Author: Ross J Anderson; Vaclav Matyas Jr; Fabien A Petitcolas; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Protocols using anonymous connections: mobile applications, (LNCS-Lecture Notes in Computer Science 1361) Hal 13-23
Author: Michael G. Reed; Paul F. Syverson; David M. Goldschlag; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Receipt-free electronic voting schemes for large scale elections,(LNCS-Lecture Notes in Computer Science 1361) Hal 25-35
Author: Tatsuaki Okamoto; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Flexible internet secure transactions based on collaborative domains, (LNCS-Lecture Notes in Computer Science 1361) Hal 37-51
Author: Eduardo Solana; Jurgen Harms; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next