::  Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

 
Ditemukan 105 dokumen yang sesuai dengan query
cover
The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security,...
Berlin: Springer-Verlag, 2012
e20409976
eBooks  Universitas Indonesia Library
cover
The two-volume set LNCS 7289 and 7290 constitutes the refereed proceedings of the 11th International IFIP TC 6 Networking Conference held in Prague, Czech Republic, in May 2012. The 64 revised full papers presented were carefully reviewed and selected from a total of 225 submissions. The papers feature innovative research...
Heidelberg: Springer-Verlag, 2012
e20410522
eBooks  Universitas Indonesia Library
cover
The two-volume set LNCS 7289 and 7290 constitutes the refereed proceedings of the 11th International IFIP TC 6 Networking Conference held in Prague, Czech Republic, in May 2012. The 64 revised full papers presented were carefully reviewed and selected from a total of 225 submissions. The papers feature innovative research...
Heidelberg: Springer-Verlag, 2012
e20410523
eBooks  Universitas Indonesia Library
cover
This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software. The 20 papers, presented together with the abstract of...
Berlin: Springer-Verlag, 2012
e20410280
eBooks  Universitas Indonesia Library
cover
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST...
Berlin : Springer-Verlag, 2012
e20410066
eBooks  Universitas Indonesia Library
cover
This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011. The 10 revised full papers presented together...
Berlin: Springer-Verlag, 2012
e20409515
eBooks  Universitas Indonesia Library
cover
This book constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing, TGC 2011, held in Aachen, Germany, in June 2011. The 14 revised full papers presented were carefully reviewed and selected from 25 submissions. The papers are organized in topical sections on modeling formalisms for concurrent...
Berlin: Springer-Verlag, 2012
e20409032
eBooks  Universitas Indonesia Library
cover
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2012, held in Vienna, Austria, in September 2012 in conjunction with DEXA 2012. The 18 revised full papers presented together with 12 presentations of EU projects were carefully reviewed and selected...
Berlin: Springer-Verlag, 2012
e20410104
eBooks  Universitas Indonesia Library
cover
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with...
Berlin: Springer-Verlag, 2012
e20410470
eBooks  Universitas Indonesia Library
cover
Fauhan Handay Pugar, author
Dalam beberapa tahun terakhir, penelitian algoritma enkripsi citra menggunakan compressive sensing dan sistem chaotic telah banyak dikembangkan. Dengan memanfaatkan properti yang kompleks dari ergodisitas, tidak mudah untuk diprediksi, dan sensitifitas terhadap keadaan awal dari suatu sistem chaotic, suatu sistem chaotic dapat digabungkan dengan compressive sensing. Banyak algoritma enkripsi yang menggunakan...
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2020
T-Pdf
UI - Tesis (Membership)  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>