Search Results for Computers -- Access control - Narrowed by: English - Computers -- Access control - Wen-Guey, TzengSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Computers$002b--$002bAccess$002bcontrol$002509Computers$002b--$002bAccess$002bcontrol$0026qf$003dAUTHOR$002509Author$002509Wen-Guey$00252C$002bTzeng$002509Wen-Guey$00252C$002bTzeng$0026ps$003d300?dt=list2024-05-01T02:54:00ZAn access control scheme based on Chinese remainder theorem and time-stamp conceptent://SD_ILS/0/SD_ILS:4545512024-05-01T02:54:00Z2024-05-01T02:54:00Zby Min-Shiang, Hwang<br/>Author Min-Shiang, Hwang, Wen-Guey, Tzeng, Wei-Pang, Yang<br/>Format: Books<br/>Call Number MAK 7183<br/>A two-key-lock-pair access control method using prime factorization and time stampent://SD_ILS/0/SD_ILS:4597632024-05-01T02:54:00Z2024-05-01T02:54:00Zby Min-Shiang, Hwang<br/>Author Min-Shiang, Hwang, Wen-Guey, Tzeng, Wei-Pang, Yang<br/>Format: Books<br/>Call Number MAK 7184<br/>