Your search for 40379 returns 195 document(s) |
Alternatif pengamanan fisik terhadap strong room dengan menggunakan sescet sharing scheme dengan sum labeling sebagai representasi access structure-nya, Hal. 323-326 |
Author: Arie Setya Dewi; Danang Jaya; Rahmi Rusin; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Qos oriented bandwidth management scheme for stable multimedia sevices on the IMT-2000 networks, Hal. 289-294 |
Author: Sung-Hyun Cho, Seung-Jei Yang, Shin Heu, Sung-Han Park; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Polylog-time and near-linear work approximation scheme for undirected shortest paths,hal 16-26 |
Author: Edith Cohen; | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Certificateless signature scheme without random oracles,(LNCS-Lecture Notes in Computer Science 5576) Hal. 31-40 |
Author: Vineela Muppavarapu ad Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An improved secure indentity-based on-lined /off-lined signature scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal. 588-597 |
Author: Jianghong Zhang; Yixian Yang; Xinxin Niu; Shengnam Gao; Hua Chen; Qin Geng; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
HOTP-Based user authentication scheme in home networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 672-681 |
Author: Binod Vaidya; Jong Hyuk Park; Joel J.P.C. Rodrigues; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A study on feasibility and establishment of a security grade certification scheme for the new IT services, (LNCS-Lecture Notes in Computer Science 5576) Hal 769-777 |
Author: Hangbae Chang; Jonggu Kang; Hyukjun Kwon; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A group key distribution scheme with decentralised user join, (LNCS-Lecture Notes in Computer Science 2576) Hal 146-163 |
Author: Hartono Kurnio; Rei Safavi-Naini; Huaxiong Wang; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An IP traceback scheme integrating DPM and PPM, (LNCS-Lecture Notes in Computer Science 2576) Hal 76-85 |
Author: Fan Min; Jun-yan Zhang; Guo-wie Yang; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A threshold GQ signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 137-150 |
Author: Li-Shan Liu; Cheng-Kang Chu; Wen-Guey Tzeng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|