Search Results for - Narrowed by: Computer network protocols - English - CryptographySirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qf$003dSUBJECT$002509Subject$002509Computer$002bnetwork$002bprotocols$002509Computer$002bnetwork$002bprotocols$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Cryptography$002509Cryptography$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-06-19T03:55:14ZA new authentication protocol for distributed environmentent://SD_ILS/0/SD_ILS:3307322024-06-19T03:55:14Z2024-06-19T03:55:14Zby Abdukadir Moalim Ali<br/>Author Abdukadir Moalim Ali<br/>Format: Books<br/>Call Number TK5105.55 A22 2000 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Thesis (Master of Science (Computer Science)) - Universiti Teknologi Malaysia, 2000<br/>A new authentication protocol for distributed environmentent://SD_ILS/0/SD_ILS:215642024-06-19T03:55:14Z2024-06-19T03:55:14Zby Abdukadir Moalim Ali<br/>Author Abdukadir Moalim Ali<br/>Format: Visual Materials<br/>Call Number MFL 12302<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Thesis (Master of Science (Computer Science)) - Universiti Teknologi Malaysia, 2000<br/>