Search Result Save to File Save as CSV
Your search for 53363 returns 2309 document(s)
A ring signature scheme based on the nyberg-rueppel signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 169-175
Author: Chong-zhi Gao; Zheng-an Yao; Lei Li; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An Empirical Study of the Characteristics of Access Control Model Towards Secure KMS in Collaborative Environment (hal 1378-1383)
Author: Azreena Abu Bakar, Rusli Abdullah, Nur Izura Udzir, Hamidah Ibrahim; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Normal Based Subdivision Scheme for Curve Design, page 243-260
Author: X. Yang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
General scheme of region competition based on scale space, page 1366
Author: M. Tang And S. Ma | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Full disk encryption based on virtual machineb and ken recovery scheme, 217-222
Author: Min Liang, Jiang-ke Xu; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Networking Scheme for Transmission Line Monitoring System Based on loT (180-184)
Author: ruixue LI Jianming LIU Xiangzhen LI; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Semantic Broadcast Scheme for a Mobile Environment based on Dynamic Chunking (522-229)
Author: K. Lee H. Leong A. Si; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A secure group rekeying scheme with compromised node revocation in wireless sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 712-721
Author: Asma Khalid; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Multi-party computation from any linear scret sharing scheme unconditionally secure againts adaptive adversary: the zero-error case, hal. 1-15
Author: Ventzislav Nikov; Svotla Nikova; Bark Preneel; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Pattern based Design for Secure and Safe Mobile Agent System (13-17)
Author: N. Yoshioka Y. Tahara S. Honiden A. System; | Call Number: SEM-306 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next