ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Agronomy and forestry
Biology
Environment
Social Sciences
Education
Research
Technology
Geography
Zoology
Botany
all records (70)

Languages
English
Portuguese
Spanish
German
French

Countries
Indonesia
USA
Brazil
India
Denmark
Canada
Romania
Spain
South Africa
Italy
all records (73)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
4.189  Articles
1 of 420 pages  |  10  records  |  more records»
Cara untuk mengamankan citra dapat dilakukan dengan kriptografi. Penelitian pada algoritma kriptografi sudah cukup banyak berkembang. Beberapa penelitian menyebutkan bahwa menggabungkan dua algoritma kriptografi dapat lebih meningkatkan keamanan dari citr... see more

The security and confidentiality of a message or document sent to other people must be guaranteed its confidentiality and security, so that the message or document is not misused by parties who do not have an interest in the message. Security and confiden... see more

Abstract – Technological developments in data security systems to ensure the confidentiality of data information has developed rapidly. To maintain the confidentiality of data information, there are sciences in development such as steganography and crypto... see more

Abstract - To secure data, cryptographic techniques are needed, but many cryptographic methods are vulnerable that require attacks. But not with the Blowfish method which includes a symmetric key algorithm that has the same key to encrypt and decrypt data... see more

Abstract - Access to information in the current era is easily accessible and can be accessed anywhere and anytime. Our data can be accessed in public or confidential, for confidential data the very need for security is taken or manipulated by parties who ... see more

Security and confidentiality of documents stored on a computer is an important aspect in the field of computer or information system security. Documents will no longer be useful if they are intercepted or hijacked by unauthorized people, they will even en... see more

Various kinds of problems are threatening homeowners from the danger of fire to the danger of theft. To reduce the crime rate that occurs in the community, especially the crime of theft and fire hazard, we need an Internet-based home security tool that ca... see more

 The development of sophisticated technology in this era is increasingly rapid, messages that are hidden or kept a secret from people who want to access the secret message need to be safeguarded by the security of the message. One way to be able to h... see more

The development of technology at this time allows everyone to exchange information without any limitation of time and distance. The possibility that data leakage will occur during the process of exchanging information is carried out, therefore in sending ... see more

1 of 420 pages  |  10  records  |  more records»