Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 8081 dokumen yang sesuai dengan query
cover
New York : nternational Secretariat Institute of Pasific Relations, 1945
327.990 SEC (1)
Buku Teks  Universitas Indonesia Library
cover
Meaney, Neville Kingsley
Sydney: University Press , 1976
327.94 MEA s
Buku Teks SO  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012.
The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices."
Berlin: Springer-Verlag, 2012
e20407817
eBooks  Universitas Indonesia Library
cover
cover
Sharp, Andrew M.
Oxford: Clarendon Press, 1960
990.01 SHA d
Buku Teks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues."
Heidelberg: Springer, 2012
e20408388
eBooks  Universitas Indonesia Library
cover
"Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits : (1) introduction of the most recent information technology and its related ideas, (2) applications and problems related to technology convergence, and its case studies, and (3) introduction of converging existing security techniques through convergence security.
"
Dordrecht, Netherlands: [, Springer], 2012
e20399406
eBooks  Universitas Indonesia Library
cover
Taipei: Food and Fertilizer Technology Center for the Asian and Pasific Region, 1970
630.601 ANN
Buku Teks  Universitas Indonesia Library
cover
Singapore: Institute of Southeast Asian Studies, 1989
355.03 LEA
Buku Teks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of 5 workshops co-located with SAFECOMP 2012, the 31st International Conference on Computer Safety, Reliability, and Security, held in Magdeburg, Germany, in September 2012.
The 49 revised full papers presented were carefully reviewed and selected from numerous submissions. According to the workshops covered, the papers are organized in topical sections on: next generation of system assurance approaches for safety-critical systems (Sassur), architecting safety in collaborative mobile systems (ASCoMS), dependable and secure computing for large-scale complex critical infrastructures (DESEC4LCCI), ERCIM/EWICS/cyberphysical systems (ERCIM/EWICS), and on digital engineering (IWDE)."
Berlin : Springer-Verlag, 2012
e20410578
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>