Your search for 53362 returns 482 document(s) |
Anonymous Identity Authentication Scheme In Wireless Roaming Communication (124-129) |
Author: Tao Feng
Wenying Zhou
Xinghua Li; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
WAPI Secure Access Authentication Scheme for Heterogeneous Network Based on Identity-Based Cryptograph (130-135) |
Author: FENG Tao
JIAO Jian; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Improved CRT-based broadcast authentication scheme in WSNs, hal. 47-50 |
Author: Yunjie Zhu, YuShen; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Research of near field wireless communication, 525-531 |
Author: Dai Wei, Luo Guangjun, Liu Shaohua; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Flexible Vitebri Decoder for Wireless Communication (V1-455 -- V1-458) |
Author: Li Zhou
Bangjian Xu
Dongpei Liu
Botao Zhang
Hengzhu Liu; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Adaptive Data Delivery in Wireless Communication Environments (444-453) |
Author: C. Lin
D. Lee; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
HOTP-Based user authentication scheme in home networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 672-681 |
Author: Binod Vaidya; Jong Hyuk Park; Joel J.P.C. Rodrigues; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Avoiding energy-hole in wireless sensor networks with hybrid communication model, 149-152 |
Author: Huiyong Yuan, Jianbo Wang, Jinsheng Xie; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementasi tmato firmware pada linksys wireless router dengan proses authentication,accounting menggunakan radius server. ( hal. F-51/F-55 ) |
Author: Rochmad Nurul Hidayat; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security Challenges in Wireless Mesh Network Deployment and User Authentication (EAP) Method (V1-333 -- V1-337) |
Author: Min Lin
Shaoyong Chen; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|