Search Result Save to File Save as CSV
Your search for 52290 returns 518 document(s)
The Impact of Recofery on Concurrency Control (259-269)
Author: William E. Weihl; | Call Number: SEM-379 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Concurrency Control in Groupware Systems (399-407)
Author: C.A. Ellis S.J. Gibbs; | Call Number: SEM-228 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
MAGIC PEN: REMOTE CONTROL PRESENTER
Author: Virgy Londa, Adityano Ratu, Debby Sondakh; | Call Number: SEM-361 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Security protocols: internal workshop, cambridge, United Kingdom, April 1996 Proceedings/Mark Lomas
Call Number: 004.62 Sec | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network address translators: effects on security protocols and applications in the TCP/IP stack, page 42
Author: Shiuh-Pyang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Broadcast protocols to support efficient retrieval from databases by mobile users, page 1
Author: Datta | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
DDN protocol handbook volume 2 Darpa Internet Protocols December 1985/ Elizabeth J. Feinler
Call Number: R.355.028 Ddn | Type: Buku Referensi
Find Similar |  Add To Favorites |  Detail in New Window 
Some application of polynomials for the design of cryptographic protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-13
Author: Eyal Kushilevitz; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Forward secrecy in password-only key exchange protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 29-44
Author: Jonathan Katz; Rafail Ostrovsky; Moti Yung; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient re-keying protocols for multicast encryption, (LNCS-Lecture Notes in Computer Science 2576) Hal 119-132
Author: Giovanni Di Crescenzo; Olga Kornievskaia; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next