Search Result Save to File Save as CSV
Your search for 45285 returns 101 document(s)
Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting, (LNCS-Lecture Notes in Computer Science 5576) Hal 797-803
Author: Song-Hee Lee; Nam-Sup Park; Soo Kyun Kim; Jin-Young Choi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Round optimal distributed key generation of threshold cryptosystem based on discrete logarithm problem, (LNCS-Lecture Notes in Computer Science 2576) Hal 96-110
Author: Rui Zhang; Hideki Imai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults, (LNCS-Lecture Notes in Computer Science 1361) Hal 115-124
Author: F. Bao; R.H. Deng; Y. Hang; A. Jeng; A. D. Narasimhalu; T. Ngair; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Open key exchange: how to defeat dictionary attacks without encrypting public keys, (LNCS-Lecture Notes in Computer Science 939) Hal 79-90
Author: Stefan Lucks; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Computing the M=UU t integer matrix decomposition, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 223-233
Author: Katharina Geibler and Nigel P. Smart; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan digital dashboard system untuk menyajikan key performance indicators: studi kasus bidang riset dan penelitian Fak. Ilmu Komputer UI/ Edwin Richardo
Author: Edwin Richardo; | Call Number: SK-0685 (Softcopy SK-0166) Source Code SK-0156 | Edition: Dana Indra Sensuse | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Pemenuhan Klausula ISO 9001:2000 denganmenerapkan Key Process area Requirements Management: studi kasus Soft. Develpment Center PT Fujitsu System Indonesia
Author: Astari Retnowardhani; | Call Number: T-0296 | Edition: 2002 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
More detail for combined timing and power attack againt implementation of RSA, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898) Hal. 245-263
Author: Werner Schinler and Colin D. Walter; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The X.25 protocol and seven other key CCITT recommendations: X.1., X.2, X.3, X.21, X.21bis, X.28, and X.29/ Reprinted in complete and unbridge form as they appear in fascile viii....
Call Number: 384 Int x | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Planning, designing, implementing, and managing e-government: key issues, case studies, and lessons learned: 8-12 October 2007 APCICT, Incheon, Republic of Korea Coorganized by UNU-IIST
Call Number: SEM-286 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11  Next