::  Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

 
Ditemukan 105 dokumen yang sesuai dengan query
cover
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and...
Berlin: Springer-Verlag, 2012
e20408183
eBooks  Universitas Indonesia Library
cover
Muhammad Wito Malik, author
Kemamanan merupakan suatu yang esensial pada umumnya. Beberapa data membutuhkan keamanan agar terproteksi dari hal yang tidak diinginkan. Salah satu meningkatkan keamanan adalah dengan menerapkan enkripsi. Metode enkripsi ini tergolong cepat dibanding dengan enkripsi lainnya. Algoritma yang digunakan untuk melakukan enkripsi ini adalah Advanced Encryption Standard. Skripsi ini membahas pengembangan...
Depok: Fakultas Teknik Universitas Indonesia, 2020
S-Pdf
UI - Skripsi (Membership)  Universitas Indonesia Library
cover
This book constitutes the refereed proceedings of the 8th International Conference on Distributed Computing and Internet Technology, ICDCIT 2012, held in Bhubaneswar, India, in February 2012. The 17 full papers presented together with 15 short papers in this volume were carefully reviewed and selected from 89 submissions. In addition the...
Berlin: Springer-Verlag, 2012
e20408808
eBooks  Universitas Indonesia Library
cover
This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes,...
Berlin: Springer-Verlag , 2012
e20409982
eBooks  Universitas Indonesia Library
cover
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation, (blind) signatures...
Berlin : Springer-Verlag, 2012
e20410607
eBooks  Universitas Indonesia Library
cover
This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are...
Heidelberg: Springer, 2012
e20410303
eBooks  Universitas Indonesia Library
cover
This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in...
Heidelberg: Springer-Verlag, 2012
e20409210
eBooks  Universitas Indonesia Library
cover
This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented...
Heidelberg: Springer, 2012
e20410469
eBooks  Universitas Indonesia Library
cover
This book constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, held in Trento, Italy, in September 2011. The 20 revised papers were carefully selected from numerous submissions during two rounds of reviewing. The book also contains two invited talks. The...
Heidelberg: Springer, 2012
e20410180
eBooks  Universitas Indonesia Library
cover
Riesel, Hans, author
The book treats four fundamental problems: the number of primes below a given limit, the approximate number of primes, the recognition of primes and the factorization of large numbers. The author provides explicit algorithms and computer programs, and has attempted to discuss as many of the classically important results as...
New York: Springer, 2012
e20419434
eBooks  Universitas Indonesia Library
<<   2 3 4 5 6 7 8 9 10 11   >>