Search Result Save to File Save as CSV
Your search for 45425 returns 302 document(s)
Protocol-related problem threaterns internet* Faster storage connectivity technologies emerge* New wireless technology is in sight, page 20
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Speech-act-based negotiation protocol: design, implementation, and test use, page 360
Author: Man Kit C. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Formal analysis of an authentication protocol for UMTS (Universal Mobile Telecommunications systems) Using AVISPA
Author: Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 1 No. 2 Juni 2008 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
DDN protocol handbook volume 2 Darpa Internet Protocols December 1985/ Elizabeth J. Feinler
Call Number: R.355.028 Ddn | Type: Buku Referensi
Find Similar |  Add To Favorites |  Detail in New Window 
Design and implementation of the connectionless network protocol (CLNP) as loadable kernel modules in linux kernel 2.6, HAL. 245-252
Author: Bunga Sugiarto; Danny Laidi; Arra di Nur Rizal; Maulahikmah Galinium; Pradana Atmadiputra; Melvin Rubianto; Husni Fahmi; Tri Sampurno; Marsudi Kisworo; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Solaris: installation and release notes for solarnet PC protocol service 1.1 with IPX/SP/X
Call Number: 005.43 Sol | Type: Buku Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Adaptive cluster based routing protocol with ant colony optimization for mobile ad-hoc network in disaster area
Author: E. Budianto, A. Hafidh, MS Alvissalim, and A. Wibowo | Call Number: JURNAL ILMU KOMPUTER DAN INFORMASI, Vol. 5 No. 2 June 2012 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Energy consumption analysis of modified AODV routing protocol under random waypoint and reference point group mobility models, hal. 51-55
Author: Harris Simaremare, Abdusy Syarif, Abdelhafid Abouaissa, Riri Fitri Sari, Pascal Lorenz; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A New strongly secure authenticated key exchange protocol, (LNCS-Lecture Notes in Computer Science 5576) Hal. 135-144
Author: Qingfeng Cheng; Chuangui Ma, and Xuexian Hu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Forward-secrecy WTLS handshake protocol based on XTR, (LNCS-Lecture Notes in Computer Science 5576) Hal 635-643
Author: Bin Li; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   20 21 22 23 24 25 26 27 28 29  Next