Search Result Save to File Save as CSV
Your search for 54482 returns 821 document(s)
Secure wireles sensor network: solusi efisiensi sistem keamanan ubiquitous sensor network, HAL. 421-426
Author: Kholif Faiz Ma'ruf; Arif Rahman Hakim; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Secure routing in mobile ad hoc network: study and evaluation of different proposed schemes, HAL. 1054-1062
Author: Siddharth swaup Rautaray; Sanjeev Sharma; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analyzing the techniques to secure web database applications from SQL injectino attacks, HAL. 1349-1355
Author: Sushila Madan and Supriya Madan; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A New strongly secure authenticated key exchange protocol, (LNCS-Lecture Notes in Computer Science 5576) Hal. 135-144
Author: Qingfeng Cheng; Chuangui Ma, and Xuexian Hu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secure cover selection stegnography, (LNCS-Lecture Notes in Computer Science 5576) Hal. 317-324
Author: Hedieh Sajedi; Mansour Jamzad; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secure error-correction network coding in a randomized setting, (LNCS-Lecture Notes in Computer Science 5576) Hal. 570-577
Author: Yejun Zhou, Hui Li, Jianfeng Ma; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An improved secure indentity-based on-lined /off-lined signature scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal. 588-597
Author: Jianghong Zhang; Yixian Yang; Xinxin Niu; Shengnam Gao; Hua Chen; Qin Geng; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Fault tolerant secure routing in cluster based mobile sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 722-731
Author: Usama Ahmed; Muhammad Arif Wahla; Firdous Kausar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Secure multi-party computation made simple, (LNCS-Lecture Notes in Computer Science 2576) Hal 14-28
Author: Ueli Maurer; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On a class of key agreement protocols which cannot be unconditionally secure, (LNCS-Lecture Notes in Computer Science 2576) Hal 133-145
Author: Frank Niedermeyer; Werner Schindler; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   13 14 15 16 17 18 19 20 21 22  Next