Search Result Save to File Save as CSV
Your search for 45425 returns 294 document(s)
Kombinasi Vigenere Cipher Dalam Three Pass Protocol
Author: Boni Oktaviana, Mangku Mondroguno; | Call Number: SEM-342 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan algoritma kriptografi stream cipher dengan chaos, Hal. 430-434
Author: Rinaldi Munir, Bambang Riyanto; Sarwono Sutikno; | Call Number: SEM-268 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Cipher systems: the protection of communciations
Author: Beker, Henry; | Call Number: 005.82 Bek c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Konsolidasi database kependudukan nasional, HAL. E.27-E.32
Author: Riana Kuswandi; Husni Fahmi; Haret Faidah; Herald Setiadi, Zainal A. Hasibuan; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis homophonic substitution cipher dengan algoritma genetik, HAL. 42-46
Author: Ronald Wisnu H. Nico Saputro; | Call Number: SEM-286 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Metode pengamanan enskripsi RC4 stream cipher untuk aplikasi pelayanan gangguan, HAL. C.49-C.52
Author: Asti Dwi Irfianti; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Transformasi walsh untuk analisis ketidaklinearan fungsi boolean pada keamanan block cipher, HAL. H.13-H.16
Author: Yusuf Kurniawan; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Three-dimensional object recognition systems/ editor by Anil K. Jain
Call Number: 006.693 Thr | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Penerapan arsitektur three-tier terhadap optimalisasi keamanan distributed database. ( hal. E-62/E-67 )
Author: Untung Rahardja,Muhammad yusup,Eko Prasetiyani; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis terhadap simple substitution cipher menggunakan algoritma genetik, Hal. III.1-III.10
Author: Christianus Santosa D.S; Nico Saputro; | Call Number: SEM-272 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next