Search Result Save to File Save as CSV
Your search for 51767 returns 2562 document(s)
Parasitic authentication to protect your E-wallet, page 54
Author: Tim E. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A national-scale authentication infrastructure, page 60
Author: Randy Butler | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Multimodal biometric systems: a way to secure authentication, HAL. 765-771
Author: Divyakast T. Meva; R.P. Sangkhan; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
EAP-Based authentication for ad hoc network, HAL. C.133-C.138
Author: Muhammad Agni Catur Bhakti; Azween Abudllah dan Low Tan Jung; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A survey on low-cost RFID authentication protocols, hal. 81-86
Author: Irfan Syamsuddin, Song Han, Tharam Dillon; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Two-Factor Authentication Executor Microservice
Author: Tatag Aziz Prawiro; | Call Number: KP-3152 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Saat J-smart masuk sekolah
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Smart cities: reality or fiction
Author: Rochet, Claude; | Call Number: 307.1 Roc s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Enablers for smart cities
Call Number: 307.1 Ena | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14 15  Next