Search Results for Telecommunication - Narrowed by: Data encryption (Computer science) - Closed Access Book
SirsiDynix Enterprise
http://portal.utm.my/client/en_AU/main/main/qu$003dTelecommunication$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529$002509Data$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dITYPE$002509Material$002bType$0025091$00253ACLS_BK$002509Closed$002bAccess$002bBook$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list
2024-05-29T14:17:39Z
A traceable proactive anonymous electronic cash
ent://SD_ILS/0/SD_ILS:139538
2024-05-29T14:17:39Z
2024-05-29T14:17:39Z
by Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Kamaruzzaman Seman, Jasmy Yunus, National Conference on Telecommunication Technology 2000 (2000 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5102.94 C42 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>
Estimation on the security aspect of brand's electronic chas scheme
ent://SD_ILS/0/SD_ILS:396536
2024-05-29T14:17:39Z
2024-05-29T14:17:39Z
by Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Jasmy Yunus, Kamaruzzaman Seman, Australian Telecommunications Networks and Applications Conference (2004 : Sydney, Australia)<br/>Format: Books<br/>Call Number HG1710 C424 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>