Search Result Save to File Save as CSV
Your search for 40171 returns 1537 document(s)
Full disk encryption based on virtual machineb and ken recovery scheme, 217-222
Author: Min Liang, Jiang-ke Xu; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Networking Scheme for Transmission Line Monitoring System Based on loT (180-184)
Author: ruixue LI Jianming LIU Xiangzhen LI; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Semantic Broadcast Scheme for a Mobile Environment based on Dynamic Chunking (522-229)
Author: K. Lee H. Leong A. Si; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
WAPI Secure Access Authentication Scheme for Heterogeneous Network Based on Identity-Based Cryptograph (130-135)
Author: FENG Tao JIAO Jian; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Auditing for dummies
Author: Loughran, Maire; | Call Number: 657 Lou a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Developing web-based application for public regulation case study : directorate of law and regulations the national civil service agency, 81-86
Author: Muhaemin, Parwadi Moengin; | Call Number: SEM-348 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Public Key Cryptosystem based on Pell's Equation Using The Gnu Mp Library (643-648
Author: K V S S R S S Sarma P S Avadhani; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Saving Streaming Bandwidth via Wireles Sharing for a Tree-based Live Streaming System on Public-Shared Network (88-94)
Author: Hong-Yi Chang nen-Fun Huang Kwei-Bor Chen Yih-Joung Tzang Yuan-Wei Lin; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Adaptive image fusion scheme based on contourlet transform and machine learning, page 62-69
Author: M.H. Malik; S.A.M. Gilani; Anwaar-ul-Hag | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
An improved secure indentity-based on-lined /off-lined signature scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal. 588-597
Author: Jianghong Zhang; Yixian Yang; Xinxin Niu; Shengnam Gao; Hua Chen; Qin Geng; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next