Your search for 42166 returns 4279 document(s) |
Cryptography in wireless standards (inviteri paper), LNCS-Lecture Notes in Computer Science 2898), Hal. 303-305 |
Author: Valterri Niemi; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the correctness of scurity proofs for the 3GPP confidentiality and integrity algorithms, LNCS-Lecture Notes in Computer Science 2898), Hal. 206-318 |
Author: Testsu Iwata and Kaoru Kurosawa; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Remote user authentication using public information, LNCS-Lecture Notes in Computer Science 2898), Hal. 360-369 |
Author: Chris J. Mitchell; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Query answering and containment for regular queries under distortions, LNCS-Lecture Notes in Computer Science 2898), Hal. 98-115 |
Author: Gosta Grahne; Alex Thomo; | Call Number: 006.33Sei f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A key recovery mechanism for reliable group key management, (LNCS-Lecture Notes in Computer Science 2576) Hal 372-386 |
Author: Taenam Cho; Sang-Ho Lee; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
And/or branch-and-bound for solving mixed integer linear programming problems, (LNCS-Lecture Notes in Computer Science 3709) Hal 857 |
Author: Radu Marinescu; Rina Dechter; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Equivocable and extractable commitment schemes, (LNCS-Lecture Notes in Computer Science 2576) Hal 74-87 |
Author: Giovanni Di Crescenzo; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secret sharing schemes on access structures with intersection number equal to one (LNCS-Lecture Notes in Computer Science 2576) 354 |
Author: Jaume Marti-Farre; Carles Padro; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122 |
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Receipt-free electronic voting schemes for large scale elections,(LNCS-Lecture Notes in Computer Science 1361) Hal 25-35 |
Author: Tatsuaki Okamoto; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|