Search Result
Save to File
Your search for
50643
returns
3949
document(s)
Gigabit networks: standards and schemes for next-generation networking/Paul Izzo
Author: Izzo, Paul; | Call Number: 004.62 Izz g | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Comparison between RSA Hardware and Software Implementation for WSNs security Schemes (E84-E89)
Author: Abdullah said Alkalbani Teddy Mantoro Abu Osman Md Tap; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Matching of Ontologies with XML Schemes Using a Generic Metamodel (1081-1098)
Author: Christoph Quix David Kensche Xiang Li; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Line Graphs of Gamma-Acyclic Database Schemes and its Recognition Algorithm (218-221)
Author: Y.Z. Zhu; | Call Number: SEM-346 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Children and adults Schemes in Categorization of Basic Objects and Mobile Applications (103-110)
Author: Lumpapun Punchoojit Nuttanont Hongwarittorrn; | Call Number: SEM-345 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Performance Evaluation
Call Number: [2 (1982): 1-4; 3 (1983): 1-4, 4 (1984): 1-4, 5 (1985): 1-4, 6 (1986): 1-4, 7 (1987): 1-4] | Type: Jurnal/ Majalah
Find Similar
|
Add To Favorites
|
Detail in New Window
A fast and secure encryption algorithm for message communication, HAL. 629- 634
Author: Paul A.J.; Varghess Paul, P. Mythili; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Analisis sandi square terhadap Advanced Encryption Standard (AEA), Hal. 499-502
Author: Yusuf Kurniawan, Adang Suwandi A.; M. Sukrisno Mardiyanto; Iping Supriana S.; | Call Number: SEM-268 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Simulasi Penyadapan Komunikasi Menggunakan Escrowed Encryption Standar (EES)
Author: Ronsen Purba; | Call Number: SEM-356 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Keamanan cloud computing dengan menggunakan fully homomophic encryption (FHE)
Author: Juan Karsten; | Call Number: SK-1228 (Softcopy SK-710) | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
19
20
21
22
23
24
25
26
27
28
Next