Search Result Save to File Save as CSV
Your search for 40304 returns 680 document(s)
An Improved CRT-based broadcast authentication scheme in WSNs, hal. 47-50
Author: Yunjie Zhu, YuShen; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi tmato firmware pada linksys wireless router dengan proses authentication,accounting menggunakan radius server. ( hal. F-51/F-55 )
Author: Rochmad Nurul Hidayat; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian tentang Aspek security dan Authentication Sistem Informasi On Line Studi Kasus : Rancangan Sistem Informasi Akademi PEFEUI
Author: Heri Yulianto; | Call Number: T-0186 (Softcopy T-0622) | Edition: 2000 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Perbandingan robustness protokol routing AODV dan DSR pada jaringan pengindra nirkael menggunakan simulator jaringan NS2
Author: Taufiq Jannuar; | Call Number: SK-0943 (Softcopy SK-424) Source code SK-346 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
APLIKASI BROADCAST CLIENT SERVER UNTUK MANAJEMEN PEMASARAN (109-116)
Author: sapta candra miarsa ami fauzijah; | Call Number: SEM-309 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Infrastruktur IT-TV Broadcast sebuah studi kasus JAK-TV
Author: Ridwan Andi Kambau; | Call Number: PA-0080 (Softcopy PA-0080) | Edition: 2006 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Desain dan implementasi prototype aplikasi packet analyzer pada wireless sensor network
Author: Ryzky Yudha; | Call Number: SK-0976 (Softcopy SK-457) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Protocols and architectures for wireless sensor networks
Author: Karl, Holger; | Call Number: 681.2 Kar p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
EAP-Based authentication for ad hoc network, HAL. C.133-C.138
Author: Muhammad Agni Catur Bhakti; Azween Abudllah dan Low Tan Jung; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next