Results 51 to 60 of about 6,134 (128)

Aplikasi Enkripsi Dan Dekripsi Data Menggunakan Tiny Encryption Algorithm (Tea) Berbasis Java

open access: yessemanTIK, 2018
Abstract The need for data security is increasing along with the development of digital technology. Almost all communication and transaction activities are now done digitally so that worries about missing data will increase. Data is very important, so accuracy and precision of data is needed in the decision-making process.
Liana, Liana   +2 more
openaire   +2 more sources

IMPLEMENTASI METODE KRIPTOGRAFI IDEA PADA PRIORITY DEALER UNTUK LAYANAN PENJUALAN DAN PEMESANAN HANDPHONE [PDF]

open access: yes, 2011
With the rapid development of technology today, dealers priority mode used when giving a statement on the distributor is relatively old because of priority dealers still have to come to this langsung.hal distributor of course take time and cost.
HADI, M. ZEN S.   +2 more
core  

Implementasi Metode Kriptografi Advanced Encryption Standard (AES) untuk Proteksi Pesan Audio [PDF]

open access: yes, 2019
This study is to solve the problem Cryptographic techniques used to protect and maintain the confidentiality of audio messages by changing audio messages into audio messages that cannot be played by doing the encryption process and can be played back ...
Putri, T. A. (Tia)   +2 more
core   +2 more sources

Rancang Bangun Website Badan Pengawas Pemilihan Umum (Bawaslu) Kalimantan Tengah [PDF]

open access: yes, 2019
The misuse of digital image images is increasing, data or information that is of a personal nature can easily be known by others who are not entitled through digital images.
Saputra, A. C. (Ade)   +1 more
core  

Perbandingan Kriptografi RSA dengan Base64 [PDF]

open access: yes, 2017
Kriptografi mempelajari teknik-teknik matematika yang berhubungan dengan aspek keamanan informasi, seperti kerahasiaan data, keabsahan data, integritas data, serta autentikasi data.
Ginting, M. (Misalina)   +1 more
core   +2 more sources

IMPLEMENTASI ALGORITMA RIJNDAEL DALAM ENKRIPSI DAN DEKRIPSI GAMBAR DIGITAL BERBASIS WEB

open access: yesJurnal Teknologi Informasi Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika, 2020
More and more abuse of digital images, data or information that is personal in nature can be easily known by others who are not entitled through digital images. This can cause material and immaterial losses to people whose personal information is misused by others. Then the application applies the Rijndael algorithm to secure digital image images which
Ade Chandra Saputra   +1 more
openaire   +2 more sources

Implementasi Algoritma LUC dalam Penyandian Teks [PDF]

open access: yes, 2018
Confidentiality and data security are very important in data communication, both for the purpose of shared security and for individual privacy. Computer users who want the data to be unknown by unauthorized parties always try to get around the way to ...
Ramadani, D. (Dewi)
core   +2 more sources

IMPLEMENTASI KRIPTOGRAFI GAMBAR MENGGUNAKAN KOMBINASI ALGORITMA ELGAMAL DAN MODE OPERASI ECB (ELECTRONIC CODE BOOK)

open access: yesTechno.Com, 2016
Studio foto Aura photography merupakan suatu usaha yang bergerak di berbagai bidang seperti studio foto, fotocopy dan warnet. Studio ini memiliki satu komputer server dan delapan komputer client (warnet), dimana komputer server digunakan untuk menyimpan ...
Delva Rizal, T Sutojo, Yuniarsi Rahayu
doaj  

HALAMAN JUDUL APLIKASI KRIPTOGRAFI SUARA MENGGUNAKAN ALGORITMA ADVANCED ENCRYPTION STANDARD (AES) [PDF]

open access: yes, 2014
Komunikasi berupa pesan suara menjadi salah satu cara alternatif untuk saling berbagi informasi. Masalah yang dihadapi saat melakukan pengiriman informasi adalah integritas data pesan suara mungkin berubah pada penerima.
Endah, Sukmawati Nur, SAPUTRA, RISWAN
core  

Aplikasi Penyandian Pesan Teks dengan Menggunakan Metode Block Chiper Mode ECB [PDF]

open access: yes, 2018
Encoding of text messages is very necessary to encode a message so that it is not stolen by irresponsible parties. Cryptography is one technique that can be used to carry out security messages, namely by encoding original messages that are understood to ...
Manurung, F. (Francius)
core   +2 more sources

Home - About - Disclaimer - Privacy