Search Results
Optimization of Data Security Protection with Full SSL Inspection on AWS Using FortiGate Virtual Appliance
Authors: Yuma Akbar, Gipari Pradina Abdillah, Dadang Iskandar Mulyana, Sutisna Sutisna
View Affiliation Details
Data Transfer Security in IoT Communication Based on Attribute-Based Cryptography
Authors: Adel Abidullah, Khoshal Rahman Rahmani, Wali Mohammad Wadeed, Musawer Hakimi
View Affiliation Details
Integrating Zero Trust Architecture with Blockchain Technology to Maintain Data Security in the Cloud
Authors: T. Irfan Fajri, Handry Eldo, Cut Susan Octiva, Dikky Suryadi, Muhammad Lukman Hakim
View Affiliation Details
User Trust, Security, and Data Privacy Awareness in GoPay Usage Using Protection Motivation Theory (PMT)
Authors: Diva Ayu Gitareswara, Tri Suratno, Dewi Lestari
View Affiliation Details
Implementation of Zero-Knowledge Encryption in a Web-Based Password Manager
Authors: R. Krisviarno Darmawan, Ariya Dwika Cahyono
View Affiliation Details
Risk Management Evaluation Based on ISO/IEC 27005 Framework: A Case Study of ABC Company IT Workshop Room
Authors: Muhammad Ferdi Kurniawan, Triana Dewi Salma
View Affiliation Details
Message Security in Classical Cryptography Using the Vigenere Cipher Method
Authors: Purwanti, Saputra Dwi Nurcahya , Dian Nazelliana
View Affiliation Details
Comparative Study of Processing Student Learning Results Scores using Microsoft Excel with the RDM (Digital Madrasah Report Card) Website
Authors: Ahmad Musyadad Haury, Suprih Widodo, Rizki Hikmawan
View Affiliation Details
Super Encryption Cryptography for Land Certificate Data Security: A Case Study of the Jayapura City Land Agency
Authors: Ray Setiawan Panyuwa, Suharyadi
View Affiliation Details
Performance Analysis of the SiJaspro Application as a Tool for Physical Fitness Testing at Jasdam II Sriwijaya
Authors: Nurul Huda, R. M. Nasrul Halim, Devi Udariansyah, Tri Agung Dianto
View Affiliation Details
Training Information System at PT. Teknik Media Utama Banda Aceh City
Authors: Chandra Bayu Aji
View Affiliation Details
Development of a Prototype for a Product Recommendation System Using Blockchain Technology
Authors: Adrian Tri Setiawan, Djarot Hindarto
View Affiliation Details
Application of Machine Learning in Computer Networks: Techniques, Datasets, and Applications for Performance and Security Optimization
Authors: Memed Saputra, Fegie Yoanti Wattimena, Davy Jonathan
View Affiliation Details
Development of a Web-Based E-Administration System for the Indralaya Ogan Ilir Police Department Utilizing the System Development Life Cycle (SDLC) Approach
Authors: Devi Udariansyah, Asta Sapriyogi
View Affiliation Details
CloudPresence: An Innovative Mobile-Based Teacher Attendance Information System with Firebase Integration
Authors: David Maulana Putra Pradana, Afwan Anggara
View Affiliation Details
Implementation of Digital Signatures in the Integrated Patient Progress Notes System at XYZ Hospital Bandung
Authors: Tasya Saldira Putri Supriadi, Yuda Syahidin, Yuyun Yunengsih
View Affiliation Details
Optimizing the 2024 Governor Election Quick Count with Extreme Gradient Boosting (XGBoost) to Increase Voting Prediction Accuracy
Authors: I Wayan Gede Suacana, Didik Suhariyanto, Ferdinant Nuru
View Affiliation Details
Online Digital Invitation (An Implementation with Go-Web)
Authors: Adi Ahmad, M. Arinal Ihsan, Hanis Novansyah, Muharratul Mina Rizky, Bakruddin
View Affiliation Details
Billing Barber Shop (An Implementation of GoodBarber App Builder)
Authors: Upik Sri Sulistyawati, Bahruni, Afrizal, Alfina