Muhamad Al Fikri, author
Verifikasi formal protokol otentikasi dan komunikasi suara perangkat X menggunakan Scyther Tool = Formal verification of the authentication and voice communication protocol security on device X using Scyther Tool
Fakultas Teknik Universitas Indonesia, 2020
 UI - Tesis Membership
Arief Budiman, author
Perancangan Disaster Recovery Plan Komunikasi Suara: Studi Kasus Bank XYZ = The Designing Voice Communication Disaster Recovery Plan: Case Study of Bank XYZ
Fakultas Ilmu Komputer Universitas Indonesia, 2021
 UI - Tugas Akhir
Nurul Biandra Promoeriezky Sendjaja, author
Kebijakan dan regulasi sistem keamanan Dunia Maya (Cyber Security) di Inggris periode 2007 - 2016 = Cyber security policies and regulations in the United Kingdom period 2007 - 2016 / Nurul Biandra Promoeriezky Sendjaja
2017
 UI - Tesis Membership
Cremers, Cas, author
Operational semantics and verification of security protocols
Springer-Verlag, 2012
 eBooks
Security for mobility
edited by Chris J. Mitchell
Institution of Engineering and Technology, 2009
 eBooks
<<   1 2 3   >>