VPN Site To Site Implementation Using Protocol L2TP And IPSec

B Santoso, A Sani, T Husain, N Hendri - Teknokom, 2021 - teknokom.unwir.ac.id
Data exchange communication has developed, which leads to centralized communication,
and to achieve this communication requires a type of data communication whose data is …

Classification of security levels to enhance the data sharing transmissions using blowfish algorithm in comparison with data encryption standard

M Mahendra, PS Prabha - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
To ensure the information with limiting the spillage and loss of information, by fostering the
privacy, integrity of information move through the cloud and improve the trust pace of the …

Tinjauan Sistematis: Implementasi Cloud Computing Terhadap Keamanan Layanan Publik

E Suhendar - Smart Comp: Jurnalnya Orang Pintar …, 2022 - ejournal.poltekharber.ac.id
Cloud computing adalah teknologi revolusioner yang memungkinkan pengguna untuk
berbagi layanan, data, dan sumber daya lainnya di seluruh jaringan. Jika sejumlah besar …

Pengembangan Restful API untuk Aplikasi Klasifikasi Jenis Tanah Berbasis Mobile Pada Google Cloud

M Firdaus, R Afwani - Jurnal Teknologi Informasi, Komputer, dan …, 2024 - jtika.if.unram.ac.id
Soil plays an important role and serves as the foundation of life for all living things.
Determining soil type is very important in fields such as agriculture, land management, and …

[PDF][PDF] Analisis Keamanan dan Perlindungan Data pada Komputasi Awan dalam Ruang Lingkup Pendidikan

I Taofik, I Afrianto - … Komputer Indonesia. DOI: 10.13140/RG. 2.2, 2023 - researchgate.net
Dunia Pendidikan memang belum pernah benar-benar menjadi wacana yang publik di
Indonesia, upaya-upaya peningkatan kualitas mutu serta kuantitas yang membawa nama …

Library Digital Transformation: Legal and Ethical Analysis of Librarians' Use of AI to Improve Scientific Literacy

I Ismiatun, E Sukartini - … Garden: International Journal of Library Studies, 2024 - jkg.ub.ac.id
The digital transformation in modern libraries employs Artificial Intelligence (AI) to enhance
scientific literacy. However, the implementation of AI presents various legal and ethical …

Project-based learning on cryptographic using lms

M Syaifuddin, A Amrullah, RI Ginting… - JURTEKSI (Jurnal …, 2022 - jurnal.stmikroyal.ac.id
” Cryptography is one of the important subjects to learn because the content of the
discussion discusses data security. Data security has a very important role considering that …

Raw Data Security By Using Elgamal And Sha 256 Public Key Algorithm

IS Permana, T Hidayat, R Mahardiko - Teknokom, 2021 - teknokom.unwir.ac.id
The development of information technology has grown exponentially and various of data
collections and its method has been obtained. In the era of big data, data has now become …

Implementation of encrypt national ID card in Sinovi application use waterfall methodology

T Rijanandi, A Silvia, BA Safna… - RIGGS: Journal of …, 2023 - journal.ilmudata.co.id
In this era of increasingly rapid technology, the development of information systems is also
growing rapidly, because information systems provide what users need. Information is a very …

a Systematic Review Method for Security Analysis of Internet of Things on Honeypot Detection

A Yuswanto, B Wibowo - Teknokom, 2021 - teknokom.unwir.ac.id
A very significant increase in the spread of malware has resulted in malware analysis. A
recent approach to using the internet of things has been put forward by many researchers …