Search Result Save to File Save as CSV
Your search for 43852 returns 3421 document(s)
Gatekeeping in the international journal literature of chemistry, page 1652
Author: Tibor Braun | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
International engineering and technology JOURNAL OF ELCTRICAL ANALYSIS
Call Number: 2(2008): 3 | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
International Journal of Expert Systems Research and Application
Call Number: [24 (1987): 7-12, 3 (1990): 2, 4 (1991): 1-4] | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Desain Sistem Compare Electronic Journal Dan Aplikasi Suspect
Author: Ariawati; | Call Number: KP-2575 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Computer analysis of user interfaces based on repetition in transcripts of user sessions, page 309
Author: Antonio C. S. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Improved implementations of cryptosystems based on tate pairing, (LNCS-Lecture Notes in Computer Science 5576) Hal. 145-158
Author: Chang An Zhao; Dongqing Xie; Fangguo Zhang; Chong Zhi Gao; Jingwei Zhang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Clustering-based frequency i-diversity anonymization,(LNCS-Lecture Notes in Computer Science 5576) Hal. 159-168
Author: Mohammad Reza; Zare-Mirakabad; Aman Jantan; Stephane Bressan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Kademlia-based node lookup system for anonymization networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 179-190
Author: Benedikt Westermann; Andriy Panchenko; Lexi Pimenidis; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Computationally-efficient construction for the matrix-based key distribution in sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 190-199
Author: Abeldelaziz Mohaisen; Nam-Su Jho; Dowon Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Securing mobile phone calls with identity-based cryptography, (LNCS-Lecture Notes in Computer Science 5576) Hal. 210-222
Author: Mathew Smith; Christian Schridde, Bjorn Agel; Bernd Freisleben; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next