Your search for 45204 returns 664 document(s) |
New attacks against standardized macs, (LNCS-Lecture Notes in Computer Science 2887) Hal 170-181 |
Author: Antoine Joux; Guillaume Poupard; Jacques Stern; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Low cost attacks on tamper resistant devices, (LNCS-Lecture Notes in Computer Science 1361) Hal 125-136 |
Author: Ross Anderson; Markus Kuhn; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks, Page 497-523 |
Author: Kai-Lun Hui, Seung Hyun Kim, and Qiu-Hong Wang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Effects of Smishing Attacks on Service Delivery Using Mobile Technology: A Case Study of Rwanda |
Author: Sosthene Bwigenge; | Call Number: T-1288 (Softcopy T-996) Mak T-87 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Effects of Smishing attacks on Service Delivery Performance Using Mobile Smartphones: A Systematic Literature Review |
Author: Sosthene Bwigenge; | Call Number: TR-CSUI/ 008-2021 | Type: Technical Report
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the security propeties and attacks againts mobile agent graph head scaling (MGHS), (LNCS-Lecture Notes in Computer Science 5576) Hal. 223-228 |
Author: Abid Khan; Qasim Arshad; Xiamu Niu; Zhang Yong; Muhammad Waqas Anwar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Open key exchange: how to defeat dictionary attacks without encrypting public keys, (LNCS-Lecture Notes in Computer Science 939) Hal 79-90 |
Author: Stefan Lucks; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisis kinerja algorithma Hopscotech untuk konduktivitas, panas pada komputer paralel berbasis transputer/I Made Astawa |
Author: Astawa, I. Made; | Call Number: 004.35 Ast a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A proposal for designing a tool to record descussion made among team members during design of databases of application, Hal. 671-678 |
Author: Kumar, Sanjay Jain; Chaudhary, Banshi D.; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A proposal for designing a tool ro record discussion made among team members during design of databases of applications, HAL. 671-678 |
Author: Sanjay Kumar Jain; Banshi D. Chaudary; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|