NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 14
1.
  • Peningkatan Keamanan Kripto... Peningkatan Keamanan Kriptografi Caesar Cipher dengan Menerapkan Algoritma Kompresi Stout Codes
    Mesran, Mesran; Nasution, Surya Darma Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (Online), 12/2020, Letnik: 4, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    The development of applications that can crack passwords or data that has been secured by cryptographic algorithms has made researchers try various ways to further secure the data they have. Even ...
Celotno besedilo
2.
  • Computer Based Test Untuk S... Computer Based Test Untuk Seleksi Masuk Politeknik Negeri Bengkalis
    Agus Tedyyana; Danuri Danuri Digital zone, 11/2017, Letnik: 8, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Abstrak- Penyeleksian calon mahasiswa baru dapat dilakukan dengan aplikasi Computer Based Test (CBT). Metode yang digunakan meliputi teknik pengumpulan data, analisis sistem, model perancangan, ...
Celotno besedilo

PDF
3.
  • Chained Compressed Sensing for Iot Node Security
    Mangia, Mauro; Marchioni, Alex; Pareschi, Fabio ... ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
    Conference Proceeding

    Compressed sensing can be used to yield both compression and a limited form of security to the readings of sensors. This can be most useful when designing the low-resources sensor nodes that are the ...
Celotno besedilo
4.
  • Más allá de la historia ofi... Más allá de la historia oficial. Escritura doméstica y claves secretas en las cartas de los conquistadores del Nuevo Mundo
    Mena García, Carmen Caravelle (1988), 12/2013, Letnik: 101, Številka: 101
    Journal Article
    Recenzirano
    Odprti dostop

    El género epistolar constituye una fuente de información histórica de extraordinaria importancia tanto para la reconstrucción del complejo mundo de las mentalidades, como de la vida cotidiana y de la ...
Celotno besedilo

PDF
5.
  • Design Of Computer Based Te... Design Of Computer Based Test Using The Unified Modeling Language
    Tedyyana, Agus; Danuri; Lidyawati IOP Conference Series: Earth and Environmental Science, 12/2017, Letnik: 97, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The Admission selection of Politeknik Negeri Bengkalis through interest and talent search (PMDK), Joint Selection of admission test for state Polytechnics (SB-UMPN) and Independent (UM-Polbeng) were ...
Celotno besedilo

PDF
6.
  • Design and Implementation o... Design and Implementation of an Electronic Identification Card
    Flores-Escalante, J.; Pérez-Dí­az, J.; Gómez-Cárdenas, R. Journal of applied research and technology, 12/2009, Letnik: 7, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper we present an “Electronic Identification Card” (EIC). This EIC is designed to provide a high degree of security for user authentication using biometrics, cryptography and steganography. ...
Celotno besedilo

PDF
7.
  • Qubit authentication Qubit authentication
    Curty, Marcos; Santos, David J.; Pérez, Esther ... Physica A, 11/2002, Letnik: 314, Številka: 1
    Journal Article
    Recenzirano

    Secure communication requires message authentication. In this paper we address the problem of how to authenticate quantum information sent through a quantum channel between two communicating parties. ...
Celotno besedilo
8.
  • Innovative Authentication Method for IoT Devices
    Vasile, Daniel C.; Svasta, Paul M. 2019 22nd European Microelectronics and Packaging Conference & Exhibition (EMPC), 2019-Sept.
    Conference Proceeding

    This work provides an innovative method for a very important cryptographic function used in securing the communications in an IoT network: authenticating a device based on the identity obtained from ...
Celotno besedilo
9.
  • A cryptography method emplo... A cryptography method employing a new mathematical paradigm for public keys schemes
    Ribeiro, Vinicius Gadis; Weber, Raul Fernando Journal of Computer Science & Technology, 10/2004, Letnik: 4, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    blic Keys Schemes usually generate two pairs of keys that bear some mathematical relation-usually, a relation of the field known as Number Theory. Identifying a key from another that is given is a ...
Celotno besedilo
10.
  • Towards a Framework to Perf... Towards a Framework to Perform DPA Attack on GALS Pipeline Architectures
    Loder, Luciano; de Souza, Adão; Fay, Marcelo ... 2014 27th Symposium on Integrated Circuits and Systems Design (SBCCI), 09/2014
    Conference Proceeding

    Differential power analysis (DPA) is a low cost method to extract secret information from supposedly secure cryptographic systems. DPA correlates the data processed with power consumption of the ...
Celotno besedilo
1 2
zadetkov: 14

Nalaganje filtrov