Bibliography |
: |
[1] A. Putera, U. Siahaan, and R. Rahim, “Dynamic Key Matrix of Hill
Cipher Using Genetic Algorithm,” Int. J. Secur. It is Appl., vol. 10,
no. 8, pp. 173–180, Aug. 2016.
[2] R. Rahim, “128 Bit Hash of Variable Length in Short Message Service
Security,”
Int. J. Secur. It is Appl., vol. 11, no. 1, pp. 45–58,
Jan. 2017.
[3] R. Rahim, M. Dahria, M. Syahril, and B. Anwar, “Combination of
the Blowfish and Lempel-Ziv-Welch algorithms for text compression,”
World Trans. Eng. Technol. Educ., vol. 15, no. 3, pp. 292–
297, 2017.
[4] H. Hartono, D. Abdullah, and A. S. Ahmar, “A New Diversity
Technique for Imbalance Learning Ensembles,” Int. J. Eng. Technol.,
vol.
7,
no.
2,
pp.
478–483,
Apr.
2018.
[5] D. Abdullah, Tulus, S. Suwilo, S. Effendi, and Hartono, “DEA Optimization
with Neural Network in Benchmarking Process,” IOP
Conf. Ser. Mater. Sci. Eng., vol. 288, no. 1, p. 012041, Jan. 2018.
[6] R. Rahim et al., “Combination Base64 Algorithm and EOF Technique
for
Steganography,”
J.
Phys.
Conf.
Ser.,
vol. 1007, no. 1, p.
012003, Apr. 2018.
[7] R. Rahim, “Man-in-the-middle-attack prevention using interlock
protocol method,” ARPN J. Eng. Appl. Sci., vol. 12, no. 22, pp.
6483–6487, 2017.
[8] M. Attaran and I. VanLaar, “Privacy and security on the Internet:
how to secure your personal information and company data,” Inf.
Manag. Comput. Secur. vol. 7, no. 5, pp. 241–247, 1999.
[9] K. J. Fitzgerald, “Security and data integrity for LANs and WANs,”
Inf. Manag. Comput. Secur. vol. 3, no. 4, pp. 27–33, 1995.
[10] E. Kartikadarma, T. Listyorini, and R. Rahim, “An Android mobile
RC4 simulation for education,” World Trans. Eng. Technol. Educ.,
vol. 16, no. 1, pp. 75–79, 2018.
[11] H. Nurdiyanto, R. Rahim, and N. Wulan, “Symmetric Stream Cipher
using
Triple
Transposition
Key
Method
and
Base64
Algorithm
for
Security
Improvement,”
J.
Phys.
Conf.
Ser.,
vol.
930,
no.
1,
p.
012005,
Dec.
2017.
[12]
D. Abdullah, R. Rahim, D. Apdilah, S. Efendi, T. Tulus, and S.
Suwilo, “Prime Numbers Comparison using Sieve of Eratosthenes
and Sieve of Sundaram Algorithm,” in Journal of Physics: Conference
Series,
2018,
vol.
978,
no.
1,
p.
012123.
[13]
R. Rahim, H. Winata, I. Zulkarnain, and H. Jaya, “Prime Number:
an Experiment Rabin-Miller and Fast Exponentiation,” J. Phys.
Conf. Ser., vol. 930, no. 1, p. 012032, Dec. 2017.
[14] K. Neeraja, P. Rama Chandra Rao, D. Suman Maloji, and D. Mohammed
Ali
Hussain,
“Implementation
of
security
system
for
bank
using
open
CV
and
RFID,”
Int.
J.
Eng.
Technol.,
vol.
7,
no.
2–7,
p.
187,
Mar.
2018.
[15]
N. Srinivasu, O. Sree Priyanka, M. Prudhvi, and G. Meghana,
“Multilevel classification of security threats in cloud computing,”
Int. J. Eng. Technol., vol. 7, no. 1.5 Special Issue 5, pp. 253–257,
2018.
[16] Y. H. Kim and G. W. Bang, “Development of security camera
combined beacon signal for transmission of disaster and crime situation
as
well
as
tracking
location,”
Int.
J.
Eng.
Technol.,
vol.
7,
no.
2,
pp.
141–144,
2018.
[17]
D. Abdullah et al., “A Slack-Based Measures for Improving the Efficiency
Performance
of
Departments
in
Universitas
Malikussaleh,”
Int.
J.
Eng.
Technol.,
vol.
7,
no.
2,
pp.
491–494,
Apr.
2018.
[18]
A. E. S. Kacaribu and Ratnadewi, “Multiplying cipher images on
visual cryptography with ElGamal algorithm,” in 2015 2nd International
Conference
on
Information
Technology,
Computer,
and
Electrical
Engineering
(ICITACEE),
2015,
pp.
159–162.
[19]
Ratnadewi, R. P. Adhie, Y. Hutama, A. Saleh Ahmar, and M. I. Setiawan,
“Implementation Cryptography Data Encryption Standard
(DES) and Triple Data Encryption Standard (3DES) Method in
Communication System Based Near Field Communication (NFC),”
J. Phys. Conf. Ser., vol. 954, no. 1, p. 012009, Jan. 2018.
[20] L. Legito and R. Rahim, “SMS Encryption Using Word Auto Key
Encryption,” Int. J. Recent Trends Eng. Res., vol. 3, no. 1, pp. 251–
256, 2017.
[21] R. Rahim, D. Hartama, H. Nurdiyanto, A. S. Ahmar, D. Abdullah,
and D. Napitupulu, “Keylogger Application to Monitoring Users
Activity with Exact String Matching Algorithm,” J. Phys. Conf.
Ser., vol. 954, no. 1, p. 012008, 2018.
[22] R. Rahim et al., “Searching Process with Raita Algorithm and its
Application,” J. Phys. Conf. Ser., vol. 1007, no. 1, p. 012004, Apr.
2018.
[23] H. Nurdiyanto and R. Rahim, “Enhanced pixel value differencing
steganography with government standard algorithm,” in 2017 3rd
International Conference on Science in Information Technology
(ICSITech), 2017, pp. 366–371.
[24] R. Bhardwaj and V. Sharma, “Image Steganography Based on
Complemented Message and Inverted Bit LSB Substitution,” in
Procedia Computer Science, 2016, vol. 93, pp. 832–838.
[25] M. Ramalingam and N. A. M. Isa, “A steganography approach over
video images to improve security,” Indian J. Sci. Technol., vol. 8,
no. 1, pp. 79–86, 2015.
[26] H. Zhang, Q. Guan, and X. Zhao, “Steganography based on adaptive
pixel-value
differencing
scheme
revisited,”
in
Lecture
Notes
in
Computer
Science (including subseries Lecture Notes in Artificial
Intelligence and Lecture Notes in Bioinformatics), 2014, vol. 8389
LNCS, pp. 32–47.
[27] M. Shoeb and V. K. Gupta, “a Crypt Analysis of the Tiny Encryption
Algorithm in Key Generation,” Int. J. Commun. Comput.
Technol., vol. 01, no. 0138, pp. 5–123, 2013.
|