Your search for 40171 returns 1567 document(s) |
A Xor based public auditing scheme for proof-of -storage |
Author: Changsheng Wan; Juan Zhang; | Call Number: Sem-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The caching scheme for manet based video-on-demand system |
Author: R. Rajendra Prasath; Rashidi Abd Rahman | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Wavelet-based image watermarking scheme, Hal. 122- 132 |
Author: Alessandra Lumini; Dario Maio; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Connection-based proof search in propositional BI logic, Hal. 111-128 |
Author: Didier Glamiche; Daniel Mery; | Call Number: SEM-281 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A ring signature scheme based on the nyberg-rueppel signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 169-175 |
Author: Chong-zhi Gao; Zheng-an Yao; Lei Li; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Normal Based Subdivision Scheme for Curve Design, page 243-260 |
Author: X. Yang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
General scheme of region competition based on scale space, page 1366 |
Author: M. Tang And S. Ma | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trus based instrusion detection scheme for secure data transfer, Hal. 651-658 |
Author: Mehfuz, Shabana; Doja, M.N.; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trust based intrusion detection scheme for secure data transfer, HAL. 651-658 |
Author: Shabana Mehfuz and M.N. Doja; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Improved CRT-based broadcast authentication scheme in WSNs, hal. 47-50 |
Author: Yunjie Zhu, YuShen; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|