Trusted computing
edited by Chris Mitchell
Institution of Engineering and Technology, 2008
 eBooks
Ling, Dong, editor
Cryptographic protocol: security analysis based on trusted freshness
[Higher Education Press, ], 2012
 eBooks
Evi Fitriani, author
Can Indonesia`s good friend Australia be trusted?
Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 26 November 2013
 UI - Publikasi
Dedy Nur Hidayat, author
Kajian hukum peran dan fungsi notaris sebagai pengemban amanat kepercayaan dalam penyelenggaraan transaksi elektronik : perbandingan dengan trusted third parties dan trusted enrollment agent = Legal analysis on role and function of a notary as a trustee in electronic transaction : comparation between trusted third parties and trusted enrollmen agent
Fakultas Hukum Universitas Indonesia, 2012
 UI - Tesis (Open)
Dictionary of computing
Oxford University Press, 1983
 Buku Referensi
<<   1 2 3   >>