Search Result Save to File Save as CSV
Your search for 52959 returns 4332 document(s)
Adaptive cluster based routing protocol with ant colony optimization for mobile ad-hoc network in disaster area
Author: E. Budianto, A. Hafidh, MS Alvissalim, and A. Wibowo | Call Number: JURNAL ILMU KOMPUTER DAN INFORMASI, Vol. 5 No. 2 June 2012 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
A Forward-secrecy WTLS handshake protocol based on XTR, (LNCS-Lecture Notes in Computer Science 5576) Hal 635-643
Author: Bin Li; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
PS-LTL for constraint-based security protocol analysis, (LNCS-Lecture Notes in Computer Science 3668) Hal 439-440
Author: Ricardo Corin; Ari Saptawijaya; Sandro Etalle; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Formal analysis of an authentication protocol for UMTS (Universal Mobile Telecommunications systems) Using AVISPA
Author: Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 1 No. 2 Juni 2008 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Reconfigurable router modules using network protocol wrappers, (LNCS-Lecture Notes in Computer Science 2147) Hal 254-263
Author: Florian Braun; John Lockwood; Marcel Waldvogel; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Modelling a time-dependent protocol using the circal process algebra, (LNCS-Lecture Notes in Computer Science 1201) Hal 124-138
Author: Antonio Cerone; Alex J. Cowie; George J. Milne; Philip A. Moseley; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Using compositional preorders in the verification of sliding window protocol, (LNCS-Lecture Notes in Computer Science 1254) Hal 48-59
Author: Roope Kaivola; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
User accounting system of centralized computer networks using RADIUS protocol (hal 457 - 462)
Author: Heru Nurwarsito, Raden Arief Setyawan, Handoko D Fatikno; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of recovery in database system using a write-ahead log protocol (hal 175 - 184)
Author: Anant Jhingran, Pratap Khedkar; | Call Number: SEM - 359 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Masks classification using deep learning to revealing community comliance with the health protocol in time of pandmic COVID 19
Author: Rachmat Hidayat; | Call Number: TR-CSUI/029 (026-030) 2022 | Type: Technical Report
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   10 11 12 13 14 15 16 17 18 19  Next