[PDF][PDF] Digital Signature untuk Menjaga Keaslian Data dengan Algoritma MD5 dan Algoritma RSA

BK Hutasuhut, S Efendi… - InfoTekJar (Jurnal Nas …, 2019 - researchgate.net
Penelitian ini bertujuan untuk menjaga keaslian data untuk memberikan jaminan kepada si
penerima bahwa data tersebut bebas dari modifikasi yang dilakukan oleh pihak lain, dan …

[PDF][PDF] Signature File Analysis Using The National Institute Standard Technology Method Base on Digital Forensic Concepts

R Rizal, R Ruuhwan, S Chandra - Jurnal Informatika Universitas …, 2020 - academia.edu
The number of crimes committed by utilizing advances in information technology such as
information leakage, embezzlement of money in banks, credit card fraud, pornography …

An experimental study of cryptography capability using chained key exchange scheme for embedded devices

MAM Isa, H Hashim, JA Manan, SFS Adnan… - arxiv preprint arxiv …, 2014 - arxiv.org
After 38 years of birthday Diffie-Hellman Key Exchange (DHKE), there are many proposed
improvements in the DHKE protocol to encounter modern security issues. This protocol …

Maintaining the Integrity of Encrypted Data by Using the Improving Hash Function Based on GF (28).

SD Mohammed, AMS Rahma, TM Hasan - TEM Journal, 2020 - search.ebscohost.com
The issue of protecting the information from penetration has become an important issue. The
system that depends on the encryption ensures the confidentiality of the information non …

[PDF][PDF] Implementación de un modelo simplificado de firma digital basado en la tecnología PKI y la invocación por protocolos caso de estudio: Municipalidad de …

GB Aguilar Alcarráz - 2016 - core.ac.uk
La seguridad de la información de cualquier organización pública o privada sufre
constantemente ataques informáticos provenientes de terceros, incluso desde los usuarios …

A Comparative Study of DSRC Protocol using a Hash function with Different Modulation Techniques in Vehicular Ad Hoc Network

S Kumar, V Singh - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Because of the rapid advancement of technology, the vehicular ad hoc network (VANET) is
gaining popularity. It also plays an important function in today's automobile social …

Arbitrated digital signature for E-authentication technique of a digital message

G Ranjith, B Prathusha… - International Journal of …, 2015 - search.proquest.com
Internet became a part of human life and these days online communication gained more
popularity than traditional communication. Digital signature technology more and more …

La Independencia Tecnológica de la Firma Digital para un Gobierno Abierto 2.0 en el Perú

GBA Alcarráz… - … Florida Journal of …, 2021 - ojs.southfloridapublishing.com
La finalidad de este paper es presentar a la aplicación de la firma digital en un entorno web
a través de la tecnología y fundamentos de la PKI con la ayuda de la invocación por …

[PDF][PDF] DISSERTATION SUMMARY

NUR WIDIYASONO - balilab.id
The Internet of Things (IoT) is defined as all activities related to digital devices that can be
connected to the internet so that it is easy to carry out monitoring and remote control …

[PDF][PDF] Study of SMS encryption techniques

M Madhusudanan, P Padiya - International Journal of Computer …, 2015 - Citeseer
ABSTRACT Short Message Service (SMS) provides a very convenient way for users to
communicate and also gives other facilities. Hence, it is very popular among the users of …