Search Result Save to File Save as CSV
Your search for 45262 returns 55 document(s)
A survey on low-cost RFID authentication protocols, hal. 81-86
Author: Irfan Syamsuddin, Song Han, Tharam Dillon; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Two-Factor Authentication Executor Microservice
Author: Tatag Aziz Prawiro; | Call Number: KP-3152 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Validating a biometric authentication system: sample size requirements, page 1902
Author: S.C. Dass, Y. Zhu | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Return on investment (ROI) of a multilevel authentication design for acces control
Author: Ford Lumban Gaol dan Belawati Widjaja | Call Number: JIKT-6-1-September2006-1 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Java-based internet biometric authentication system, page 1166
Author: R.A.J. Everitt | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Fingerprint authentication system using a low-priced webcam, HAL. 689-698
Author: Md. Rajibhul Islam; Md. Shohel Sayeed and Andrews Samraj; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Secure authentication system using two-factor authenticatin techniques, HAL. 1048-1054
Author: Supriya Raheja; supriya khaitan and mandeep Kaur; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
An Improved CRT-based broadcast authentication scheme in WSNs, hal. 47-50
Author: Yunjie Zhu, YuShen; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Converged PKI-Based Authorization,Authentication Management and Delegation for an E-Business
Author: Mani Anand K.P,Narayanasamy P; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Effient model checking of network authentication protocol based on SPIN, 100-104
Author: Zhi-hua Tan, Da-fang Zang, Li MIAO, Dan Zhao; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6  Next