Search Result Save to File Save as CSV
Your search for 53363 returns 2280 document(s)
An improved secure indentity-based on-lined /off-lined signature scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal. 588-597
Author: Jianghong Zhang; Yixian Yang; Xinxin Niu; Shengnam Gao; Hua Chen; Qin Geng; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Securing mobile phone calls with identity-based cryptography, (LNCS-Lecture Notes in Computer Science 5576) Hal. 210-222
Author: Mathew Smith; Christian Schridde, Bjorn Agel; Bernd Freisleben; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Skema IBE (Identity-Based Encryption Sakai-Kashara menggunakan tate pairing dan iplementasinya
Author: Anthony; | Call Number: SK-1501 (Softcopy SK-983) | Edition: Lim Yohanes Stefanus | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Encrypting Ontological Meta-Model Using Elliptic Curve Cryptography with Identity Based Encryption (146-149)
Author: Pramukh R. Karla Sang C.sUh Varadraj P. Gurupur; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Multimodal biometric systems: a way to secure authentication, HAL. 765-771
Author: Divyakast T. Meva; R.P. Sangkhan; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Research on Unified Indentity Authentication System Based on LDAP in Campus Network (V1-646 -- V1-649)
Author: Liu Ping Li Dongmei Yang Xinfeng; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Anonymous Identity Authentication Scheme In Wireless Roaming Communication (124-129)
Author: Tao Feng Wenying Zhou Xinghua Li; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Secure authentication system using two-factor authenticatin techniques, HAL. 1048-1054
Author: Supriya Raheja; supriya khaitan and mandeep Kaur; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Source-channel coding of video signals for transmission in heterogeneous network with collisions, Hal. 502-507
Author: Gustavo A. Santana; Adriana Viveros S.; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Building secure and reliable network applicatins/Kenneth P. Birman
Author: Birman, Kenneth P.; | Call Number: 004.36 Bir b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next