Search Result Save to File Save as CSV
Your search for 42161 returns 396 document(s)
A General construction of IND-CCA2 secure public key encyption,
Author: Eike Kitz and John Malone Lee; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using public key technology-issues of binding and protection, Hal. 111-122
Author: James M. Galvin; Sandra L. Murphy; | Call Number: SEM-216 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Penerapan public key infrastructure pada prototipe aplikasi internet banking
Author: Doni Aditya P.; Heru Setiawan; Kusumorini S.; Nurfani F.; Rio Sumartha H.; | Call Number: SP-035 | Type: Student Project (SP)
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis of the public key cryptosystem based, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 234-244
Author: George Petricles; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A New Notion of Soundness in bare public-key model, (LNCS-Lecture Notes in Computer Science 2576) Hal 318-325
Author: Shirley H.C. Cheung; Xiaotie Deng; C.H. Lee; Yunlei Zhao; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
How to build evidence in a public-key infrastructure for multi-domain environments, (LNCS-Lecture Notes in Computer Science 1361) Hal 53-65
Author: Bruno Crispo; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Penerapan public key infrastructure pada pengembangan prototipe aplikasi CA engine sebagai back-end system untuk aplikasi internet banking
Author: Abraham Kristanta; Ahmad Salman R.; Haryo Timur; I snanto Nugroho; Rosita; | Call Number: SP-046 | Type: Student Project (SP)
Find Similar |  Add To Favorites |  Detail in New Window 
Public Key Cryptosystem based on Pell's Equation Using The Gnu Mp Library (643-648
Author: K V S S R S S Sarma P S Avadhani; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A New strongly secure authenticated key exchange protocol, (LNCS-Lecture Notes in Computer Science 5576) Hal. 135-144
Author: Qingfeng Cheng; Chuangui Ma, and Xuexian Hu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On a class of key agreement protocols which cannot be unconditionally secure, (LNCS-Lecture Notes in Computer Science 2576) Hal 133-145
Author: Frank Niedermeyer; Werner Schindler; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next