Your search for 53363 returns 2309 document(s) |
A ring signature scheme based on the nyberg-rueppel signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 169-175 |
Author: Chong-zhi Gao; Zheng-an Yao; Lei Li; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Empirical Study of the Characteristics of Access Control Model Towards Secure KMS in Collaborative Environment (hal 1378-1383) |
Author: Azreena Abu Bakar, Rusli Abdullah, Nur Izura Udzir, Hamidah Ibrahim; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Normal Based Subdivision Scheme for Curve Design, page 243-260 |
Author: X. Yang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
General scheme of region competition based on scale space, page 1366 |
Author: M. Tang And S. Ma | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Full disk encryption based on virtual machineb and ken recovery scheme, 217-222 |
Author: Min Liang, Jiang-ke Xu; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Networking Scheme for Transmission Line Monitoring System Based on loT (180-184) |
Author: ruixue LI
Jianming LIU
Xiangzhen LI; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Semantic Broadcast Scheme for a Mobile Environment based on Dynamic Chunking (522-229) |
Author: K. Lee
H. Leong
A. Si; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A secure group rekeying scheme with compromised node revocation in wireless sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 712-721 |
Author: Asma Khalid; Mukhtar Hussain; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Multi-party computation from any linear scret sharing scheme unconditionally secure againts adaptive adversary: the zero-error case, hal. 1-15 |
Author: Ventzislav Nikov; Svotla Nikova; Bark Preneel; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pattern based Design for Secure and Safe Mobile Agent System (13-17) |
Author: N. Yoshioka
Y. Tahara
S. Honiden
A. System; | Call Number: SEM-306 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|