Search Result
Save to File
Your search for
51767
returns
2562
document(s)
Parasitic authentication to protect your E-wallet, page 54
Author: Tim E. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
A national-scale authentication infrastructure, page 60
Author: Randy Butler | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Multimodal biometric systems: a way to secure authentication, HAL. 765-771
Author: Divyakast T. Meva; R.P. Sangkhan; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
EAP-Based authentication for ad hoc network, HAL. C.133-C.138
Author: Muhammad Agni Catur Bhakti; Azween Abudllah dan Low Tan Jung; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A survey on low-cost RFID authentication protocols, hal. 81-86
Author: Irfan Syamsuddin, Song Han, Tharam Dillon; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan Two-Factor Authentication Executor Microservice
Author: Tatag Aziz Prawiro; | Call Number: KP-3152 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Saat J-smart masuk sekolah
Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Smart cities: reality or fiction
Author: Rochet, Claude; | Call Number: 307.1 Roc s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Enablers for smart cities
Call Number: 307.1 Ena | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
6
7
8
9
10
11
12
13
14
15
Next