Your search returned 9 results.

Not what you expected? Check for suggestions
Performance comparison and evaluation of 802.011 A and its implementation in reconfigrable environment Saba Zia MSIS

by Zia, Saba MSIS.

Publisher: MCS July, 2009Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ZIA (3).
Design and analysis of an attack resistant authentication protocol Sajjad Amin

by Amin, Sajjad (Cryptology-1).

Publisher: MCS May,1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 AMI (2).
Taxonomy of cryptanalysis in Pakistan based on the experience of allied cryptanalysis efforts during world war-II Zaka Ur Rehman

by Rehman, Zaka Ur (Cryptology-1).

Publisher: MCS, May,1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 REH (2).
Information theoretic analysis of data represented in roman Urdu against normal English Arshad Ali

by Ali, Arshad (Cryptology-1).

Publisher: MCS May,1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 ALI (2).
Design and analysis of symmetric cryptographic algorithm based on 256-bit key or greater for computer communications Talha Muhammad

by Muhammad,Talha (Cryptology-1).

Publisher: MCS May,1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 MUH (2).
Tazonomy of cryptanalysis in pakistan based on the experience of allied cryptanalysis efforts during world war-II Zaka Ur Rehman MSIS

by Rehman , Ur Zaka MSIS.

Publisher: MCS 1999Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 REH (1).
Design and Implementation of a Corporate Intranet Aamir Waqar

by Waqar , Aamir.

Publisher: MCS Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.1 WAQ (1).
Design of an efficeint distance bounding protocol to counter relay attacks in resource constrained low cost RIFD system Muddassar Mushtaq,

by Mushtaq, Muddassar (MSIS-7).

Publisher: MCS February 2011Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 MUS (1).
Analysis of Malacious Applications on Smart Phone Running the Android Operating System

by NC Waleed Bin Shahid (MSIS-09).

Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SHA (1), Central Library (CL)Call number: 004 (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.