1.
|
Image Encryption on Mobile Phone Using Super Encryption Algorithm Setyaningsih, Emy - Iswahyudi, Catur
|
2.
|
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms Weerasinghe, Tharindu Darshana Bandara; BSc.Eng(Hons), MIEEE, AMIE(SL), MSc.Eng candidate, Department of Electrical and Electronic Engineering, University of Peradeniya, Peradeniya 20400, Sri Lanka
|
3.
|
A Multicore Load Balancing Model Based on Java NIO Wang, Yang; Tongji University - Qin, Guofeng; Tongji University
|
4.
|
Th. Stevens, Van der Capellen's koloniale ambitie op Java. Economisch beleid in een stagnerende conjunctuur 1816-1826 Kommers, J.H.M.
|
5.
|
Gemengd onthaal. De weerklank op Money's 'Java' in Nederland Fasseur, C.
|
6.
|
Th. Friend, The blue-eyed enemy. Japan against the West in Java and Luzon, 1942-1945 Klein, P.W.
|
7.
|
J.J. Nortier, P. Kuijt, P.M.H. Groen, De Japanse aanval op Java, maart 1942 Touwen-Bouwsma, E.
|
8.
|
E.M.C. van Enk, Britse kooplieden en de cultures op Java. Harvey Thomson (1790-1837) en zijn financiers Lindblad, J.Th.
|
9.
|
Teaching Java Programming using CABLE in a Collaborative Online Environment McKelvey, Nigel - Curran, Kevin; University of Ulster
|
10.
|
Smart Telerobotic Surveillance System via Internet with Reduced Time Delay Vasalya, Ashesh; VIT University - Agrawal, Rohit; VIT University
|