Your search for 45425 returns 308 document(s) |
Kombinasi Vigenere Cipher Dalam Three Pass Protocol |
Author: Boni Oktaviana, Mangku Mondroguno; | Call Number: SEM-342 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
APLIKASI KRIPTOGRAFI UNTUK PENGAMANAN DATA BARANG DENGAN ALGORITMA VIGENERE CHIPER |
Author: Andi Irmayana; | Call Number: SEM-361 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan algoritma kriptografi stream cipher dengan chaos, Hal. 430-434 |
Author: Rinaldi Munir, Bambang Riyanto; Sarwono Sutikno; | Call Number: SEM-268 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cipher systems: the protection of communciations |
Author: Beker, Henry; | Call Number: 005.82 Bek c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Konsolidasi database kependudukan nasional, HAL. E.27-E.32 |
Author: Riana Kuswandi; Husni Fahmi; Haret Faidah; Herald Setiadi, Zainal A. Hasibuan; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis homophonic substitution cipher dengan algoritma genetik, HAL. 42-46 |
Author: Ronald Wisnu H. Nico Saputro; | Call Number: SEM-286 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Metode pengamanan enskripsi RC4 stream cipher untuk aplikasi pelayanan gangguan, HAL. C.49-C.52 |
Author: Asti Dwi Irfianti; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Transformasi walsh untuk analisis ketidaklinearan fungsi boolean pada keamanan block cipher, HAL. H.13-H.16 |
Author: Yusuf Kurniawan; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Three-dimensional object recognition systems/ editor by Anil K. Jain |
Call Number: 006.693 Thr | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Penerapan arsitektur three-tier terhadap optimalisasi keamanan distributed database. ( hal. E-62/E-67 ) |
Author: Untung Rahardja,Muhammad yusup,Eko Prasetiyani; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|