Search Result Save to File Save as CSV
Your search for 39690 returns 3601 document(s)
A Multifunctional turbo-based receiver using partial unit memory codes, (LNCS-Lecture Notes in Computer Science 2898), Hal. 24-34
Author: Lina Pagoonee and Bahran Honary; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Improved fast correlation attack using low rate codes, (LNCS-Lecture Notes in Computer Science 2898), Hal. 67-81
Author: Havard Molland; Jaohn Erik Mathinasen, Tor Helleseth; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Remote user authentication using public information, LNCS-Lecture Notes in Computer Science 2898), Hal. 360-369
Author: Chris J. Mitchell; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Parallelizing the mur verifier, (LNCS-Lecture Notes in Computer Science 1254) Hal 256-267
Author: Ulrich Stern; David L. Dill; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
UPPAAL: status & developments, (LNCS-Lecture Notes in Computer Science 1254) Hal 456-459
Author: Kim G Larsen; Paul Pettersson; Wang Yi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The PEP tool, LNCS-Lecture Notes in Computer Science 1254) Hal 442-443
Author: Bernd Grahlmann; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Security evaluation of an infrusion tolerant web service architecture using stochastic activity networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10Hal. 260-269
Author: Zahra Aghajani; Mohammad Abdollahi Azgomi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Detection DDoS attack using dispersible traffic matrix and weighted moving average, (LNCS-Lecture Notes in Computer Science 5576) Hal. 290-300
Author: Tae Hwan Kim; Dong Seong Kim; Sang Min Lee; Jong Sou Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secure multi-party computation using virtual parties for computation on encrypted data, (LNCS-Lecture Notes in Computer Science 5576) Hal. 412-421
Author: Rohit Pathak; Satyadhar Joshi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Energy lesser broadcasting algorithms using adjustable transmission ranges in mobile ad hoc networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 502-511
Author: Toshihiko Sasama; Yashiro Abe; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next