pretraga knjiga
knjige
Donirati
Prijaviti se
Prijaviti se
prijavljenim korisnicima su dostupni:
lične preporuke
Telegram bot
istorija preuzimanja
poslati na Email ili Kindle
upravljanje zbirkama
sačuvanje u izabrano
Lično
Upite za knjige
Proučavanje
Z-Recommend
Spiskovi knjiga
Najpopularnije
Kategorije
Učešće
Donirati
Otpremanja
Litera Library
Donirati papirne knjige
Dodati papirne knjige
Search paper books
Moj LITERA Point
Pretraga ključnih reči
Main
Pretraga ključnih reči
search
1
Cryptology and Network Security: 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings
Springer-Verlag Berlin Heidelberg
Fuchun Guo
,
Yi Mu
,
Zhide Chen (auth.)
,
Feng Bao
,
San Ling
,
Tatsuaki Okamoto
,
Huaxiong Wang
,
Chaoping Xing (eds.)
key
signature
network
protocol
node
algorithm
nodes
security
adversary
secure
signatures
random
privacy
springer
schemes
heidelberg
lncs
undeniable
encryption
mobile
queries
hash
anonymity
networks
probability
proposed
first
client
attacks
query
outputs
graph
puzzles
keys
authentication
puzzle
server
eab
input
certificate
systems
function
psmt
messages
peks
different
corresponding
otherwise
ê
mobility
Godina:
2007
Jezik:
english
Fajl:
PDF, 6.14 MB
Vaši tagovi:
0
/
0
english, 2007
2
Cryptology and Network Security: 6th International Conference, CANS 2007, Singapore, December 8-10, 2007. Proceedings
Springer-Verlag Berlin Heidelberg
Fuchun Guo
,
Yi Mu
,
Zhide Chen (auth.)
,
Feng Bao
,
San Ling
,
Tatsuaki Okamoto
,
Huaxiong Wang
,
Chaoping Xing (eds.)
key
signature
network
protocol
node
algorithm
nodes
security
adversary
secure
signatures
random
privacy
springer
schemes
heidelberg
lncs
undeniable
encryption
mobile
queries
hash
anonymity
networks
probability
proposed
first
client
attacks
query
outputs
graph
puzzles
keys
authentication
puzzle
server
eab
input
certificate
systems
function
psmt
messages
peks
different
corresponding
otherwise
ê
mobility
Godina:
2007
Jezik:
english
Fajl:
PDF, 3.48 MB
Vaši tagovi:
0
/
0
english, 2007
3
Lindenbaum Method
Alex Citkin
,
Alexei Muravitsky
formula
consequence
matrix
proposition
abstract
formulas
prove
definition
structural
substitution
valuation
w.r.t
assume
implies
logical
define
lemma
first
cns
fml
formal
denote
corollary
defined
unital
modus
algebras
card
logics
suppose
reader
α1
lindenbaum
arbitrary
matrices
valid
αn
element
observe
finite
adequate
αi
heyting
sets
variables
σs
congruence
obtained
boolean
latter
Godina:
2018
Jezik:
english
Fajl:
PDF, 844 KB
Vaši tagovi:
0
/
0
english, 2018
4
Феноменология и анализ данных по рассеянию нуклонов
МГУ
Легар Ф.
,
Строковский Е.А.
θ1
θ2
θcm
φ4
φ3
wxa
φ2
φ1
dσ
dω
rnp
exp
p̃1
dn0n0
αcm
p̃2
0k0
0s0
k0nn0
hwv
_z
cnn00
k0s
λ4
n0s
yuv
00k
λ2
λ3
n1k
λ1
a00kk
k0k
00s
a00nn
n2k
cnk
cns
n0k
n1s
n2s
d0s
σ0
σck
σcs
a00sk
cce
clln0
cmln0
d0k
Godina:
2010
Jezik:
russian
Fajl:
PDF, 1.45 MB
Vaši tagovi:
0
/
0
russian, 2010
5
CHP-13
Administrator
key
coupling
mpa
diameter
stress
flange
shear
torque
transmitted
bolts
mm2
τc
keys
crushing
maximum
induced
muff
thickness
contents
considering
permissible
shearing
stresses
τk
bolt
r.p.m
keyway
shown
sunk
σck
width
τs
bush
tmax
flexible
proportions
check
sleeve
textbook
steel
allowable
couplings
designed
hollow
protective
τb
flanges
discussed
rectangular
forces
Godina:
2008
Jezik:
english
Fajl:
PDF, 611 KB
Vaši tagovi:
0
/
0
english, 2008
1
Idite na
ovaj link
ili potražite bota „@BotFather“ u Telegramu
2
Pošaljite komandu /newbot
3
Navedite ime za svog bota
4
Navedite korisničko ime za bota
5
Kopirajte poslednju poruku od BotFather i ubacite je ovde
×
×