Search Results for Computers -- Access control - Narrowed by: English - Computers -- Access control - Computer security - Books - Data encryption (Computer science)
SirsiDynix Enterprise
http://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Computers$002b--$002bAccess$002bcontrol$002509Computers$002b--$002bAccess$002bcontrol$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026qf$003dFORMAT$002509Format$002509BOOK$002509Books$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529$002509Data$002bencryption$002b$002528Computer$002bscience$002529$0026ps$003d300?dt=list
2024-04-19T04:11:47Z
Relation based access control
ent://SD_ILS/0/SD_ILS:637823
2024-04-19T04:11:47Z
2024-04-19T04:11:47Z
by Zhang, Rui<br/>Author Zhang, Rui<br/>Format: Books<br/>Call Number QA76.9.A25 Z43 2010<br/>Publisher IOS Pr.,<br/>Publication Date 2010<br/>ISBN 9783898386265<br/>
Multivariate public key cryptosystems
ent://SD_ILS/0/SD_ILS:158164
2024-04-19T04:11:47Z
2024-04-19T04:11:47Z
by Ding, Jintai<br/>Author Ding, Jintai, Gower, Jason E., Schmidt, Dieter S.<br/>Format: Books<br/>Call Number QA76.9.A25 D56 2006<br/>Publisher Springer-Verlag,<br/>Publication Date 2006<br/>ISBN 9780387322292<br/>
Database encrytion schemes : a comparative study
ent://SD_ILS/0/SD_ILS:351511
2024-04-19T04:11:47Z
2024-04-19T04:11:47Z
by Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>