Search Result Save to File Save as CSV
Your search for 52332 returns 114 document(s)
Mapping the Certification Authority for e-Government Procurement System into eGovAMAN Framework (61-66)
Author: Edit Prima Yudho Giri Sucahyo Zaunal A. Hasibuan; | Call Number: SEM-319 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Web Based Trafic Signs Mapping System In Pekalongan (C-71 -- C-74)
Author: Nurul Faizah Mochamad Zaenuri; | Call Number: SEM-316 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Penerapan Object Relation Mapping Pada Enterprise Resources Planning (72-81)
Author: Dian Indah Savitri Wisnu Ananta Kusuma; | Call Number: SEM-313 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Secure routing in mobile ad hoc network: study and evaluation of different proposed schemes, HAL. 1054-1062
Author: Siddharth swaup Rautaray; Sanjeev Sharma; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Optimal quantization and energy allocation schemes in distributed estimation for wireles sensor networks, Hal. 57-61
Author: Eni Dwi Wardihani, Wirawan, Gamantyo Hendrantoro; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Lower bound theorem for indexing schemes and its application to multidimensional range queries, Hal. 44-51
Author: Vasilis Samoladas, Daniel P. Miranker; | Call Number: SEM-243 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Equivocable and extractable commitment schemes, (LNCS-Lecture Notes in Computer Science 2576) Hal 74-87
Author: Giovanni Di Crescenzo; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secret sharing schemes on access structures with intersection number equal to one (LNCS-Lecture Notes in Computer Science 2576) 354
Author: Jaume Marti-Farre; Carles Padro; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Generalized key-evolving signature schemes or how to foil an armed adversary, (LNCS-Lecture Notes in Computer Science 2576) Hal 151-168
Author: Gene Itkis; Peng Xie; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next