Your search for 45425 returns 302 document(s) |
Protocol-related problem threaterns internet* Faster storage connectivity technologies emerge* New wireless technology is in sight, page 20 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Speech-act-based negotiation protocol: design, implementation, and test use, page 360 |
Author: Man Kit C. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Formal analysis of an authentication protocol for UMTS (Universal Mobile Telecommunications systems) Using AVISPA |
Author: Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 1 No. 2 Juni 2008 | Type: UI-ana Indek Artikel
|
Find Similar |
Add To Favorites |
Detail in New Window
|
DDN protocol handbook volume 2 Darpa Internet Protocols December 1985/ Elizabeth J. Feinler |
Call Number: R.355.028 Ddn | Type: Buku Referensi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Design and implementation of the connectionless network protocol (CLNP) as loadable kernel modules in linux kernel 2.6, HAL. 245-252 |
Author: Bunga Sugiarto; Danny Laidi; Arra di Nur Rizal; Maulahikmah Galinium; Pradana Atmadiputra; Melvin Rubianto; Husni Fahmi; Tri Sampurno; Marsudi Kisworo; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Solaris: installation and release notes for solarnet PC protocol service 1.1 with IPX/SP/X |
Call Number: 005.43 Sol | Type: Buku Manual
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Adaptive cluster based routing protocol with ant colony optimization for mobile ad-hoc network in disaster area |
Author: E. Budianto, A. Hafidh, MS Alvissalim, and A. Wibowo | Call Number: JURNAL ILMU KOMPUTER DAN INFORMASI, Vol. 5 No. 2 June 2012 | Type: UI-ana Indek Artikel
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Energy consumption analysis of modified AODV routing protocol under random waypoint and reference point group mobility models, hal. 51-55 |
Author: Harris Simaremare, Abdusy Syarif, Abdelhafid Abouaissa, Riri Fitri Sari, Pascal Lorenz; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A New strongly secure authenticated key exchange protocol, (LNCS-Lecture Notes in Computer Science 5576) Hal. 135-144 |
Author: Qingfeng Cheng; Chuangui Ma, and Xuexian Hu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Forward-secrecy WTLS handshake protocol based on XTR, (LNCS-Lecture Notes in Computer Science 5576) Hal 635-643 |
Author: Bin Li; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|