Search Result Save to File Save as CSV
Your search for 38950 returns 3805 document(s)
Security protocols for biometrics-based cardholder authentication in smartcards, (LNCS-Lecture Notes in Computer Science 2576) Hal 254-264
Author: Luciano Rila; Chris J. Mitchell; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
PS-LTL for constraint-based security protocol analysis, (LNCS-Lecture Notes in Computer Science 3668) Hal 439-440
Author: Ricardo Corin; Ari Saptawijaya; Sandro Etalle; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Concrete security analysis for 3gpp-mac, (LNCS-Lecture Notes in Computer Science 2887) Hal 154-169
Author: Dowon Hong; Ju-Sung Kang; Bart Preneel; Heuisu Ryu; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The security of one block to many modes of operation, (LNCS-Lecture Notes in Computer Science 2887) Hal 376-395
Author: Henri Gilbert; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A network security policy framework using multi-attribute decision making model, 116-120
Author: Song Yu, He Xiaoli, Ye Xiaotong, Liang Jinming, He Xianbo; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Calculus of strochastic systems for the specification, simulation, and hidden state estimation of hybrid stochastic/non-stochastic systems, (LNCS-Lecture Notes in Computer Science 999)Hal. 21-63
Author: Albert Benveniste; Bernard C. Levy; Eric Fabre; Paul Le Guernic; | Call Number: 005.369 Ant h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
PFIRES: A Policy Framework for Information Security
Author: Jackie Rees, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Konfigurasi Security Policy Selinux (130-133)
Author: Jaki Eko Istiyanto Nurhayati Masthurah; | Call Number: SEM-337 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Deployment value model for inrusion detection sensors, (LNCS-Lecture Notes in Computer Science 5576) Hal. 250-260
Author: Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Honeybee-based model to detect intrusion, (LNCS-Lecture Notes in Computer Science 5576) Hal. 598-607
Author: Ghassan Ahmed Ali; Aman Jantan; Abdulghani Ali; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next