Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 4417 from your keywords: subject="Jamming-and-Replay"
First Page Previous 21 22 23 24 25 Next Last Page
cover
Cryptography and cryptanalysis in MATLAB: creating and programming advanced a…
Comment Share
Marius Iulian MihailescuStefania Loredana Nita

Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algorithms are based and how they are used in practice, providing fully working examples for each of the algorithms presented. Implementation sections will guide you through the entire process of writing …

Edition
-
ISBN/ISSN
9781484273340
Collation
xiii, 194 hal : 23 cm
Series Title
--
Call Number
652.8 MAR c
Availability2
Add to basket
MARC DownloadCite
cover
Advances in Cyber Security : Cyber Security and Digital Forensics: Challenges…
Comment Share
Ghonge Mangesh M.,, Mangrulkar Ramchandra, LLe Dac-Nhuong

Edition
-
ISBN/ISSN
9781119795636
Collation
xxv, 395 : 23 cm
Series Title
-
Call Number
005.8 GHO a

Edition
-
ISBN/ISSN
9781119795636
Collation
xxv, 395 : 23 cm
Series Title
-
Call Number
005.8 GHO a
Availability2
Add to basket
MARC DownloadCite
cover
The IoT architect's guide to attainable security and privacy
Comment Share
Fagbemi, Damilare D.Wheeler, David M.Wheeler, J. C.

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the l…

Edition
-
ISBN/ISSN
9781000762259
Collation
xxx, 299 hlm :23cm
Series Title
--
Call Number
621.382 FAG t
Availability2
Add to basket
MARC DownloadCite
cover
Asymmetric cryptography: primitives and protocols
Comment Share
Pointcheval, David

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairing…

Edition
-
ISBN/ISSN
9781394188345
Collation
x, 448 hal : 23cm
Series Title
--
Call Number
005.84 POI a
Availability2
Add to basket
MARC DownloadCite
cover
Encrypt, sign, attack: a compact introduction to cryptography
Comment Share
Manz, Olaf

This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In ea…

Edition
Vol. 4
ISBN/ISSN
9783662660157
Collation
x, 134 hal : 23cm
Series Title
Mathematics Study Resources Series
Call Number
005.82 MAN e
Availability2
Add to basket
MARC DownloadCite
cover
Cryptography algorithms: a guide to algorithms in blockchain, quantum cryptog…
Comment Share
Bertaccin, Massimo

Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey Features* Learn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptography* Explore vulnerability and new logical attacks on the most-used algorithms* Understand the practical implementation of …

Edition
-
ISBN/ISSN
9781789618570
Collation
xvii, 340 hlm : 23 cm
Series Title
--
Call Number
652.8 BER c
Availability2
Add to basket
MARC DownloadCite
cover
Rancang Bangun Aplikasi Key Management System Berbasis Layanan Web Berdasark…
Comment Share
Desi MarlenaMagfirawatyMohamad SyahralBrian Nasywa Rayhan

Sistem Pemerintahan Berbasis Elektronik menggunakan teknologi informasi untuk memberikan suatu layanan kepada pengguna. Keamanan data dan kunci kriptografi dalam lingkup SPBE menjadi aspek kritis. Penelitian ini mengembangkan skema aplikasi key management system berbasis web berdasarkan standar NIST SP 800-57. Skema aplikasi ini terinspirasi oleh PETIR BSSN, yang belum mengimplementasikan selur…

Edition
-
ISBN/ISSN
--
Collation
xvi, 89 hal
Series Title
-
Call Number
2024 BRI r
Availability2
Add to basket
MARC DownloadCite
cover
Modifikasi Skema Proxy Re-enkripsi Menggunakan Grup Kurva Eliptik
Comment Share
Bety Hayat SusantiSri RosdianaIndah Emilia WijayantiGalang Mardani

Edition
-
ISBN/ISSN
--
Collation
xvi, 55 hal
Series Title
-
Call Number
2024 GAL m

Edition
-
ISBN/ISSN
--
Collation
xvi, 55 hal
Series Title
-
Call Number
2024 GAL m
Availability2
Add to basket
MARC DownloadCite
cover
Pemanfaatan Teknik Kriptografi dan Steganografi Guna Mengamankan Passkey pada…
Comment Share
Desi MarlenaMagfirawatyAgus Reza Aristiadi NurwaAnita Rizkiana Handiko

Pada masa sekarang ini kehidupan bersama Internet of Things sudah bukan hal yang baru. Dalam proses IoT terdapat pengiriman dan pertukaran data yang perlu diamankan. Keamanan data merupakan hal yang penting dalam konteks melindungi informasi pengguna. Secara umum, ada dua kelas sistem keamanan informasi yaitu penyembunyian informasi dan enkripsi. Keamanan data pada transmisi IoT dapat diamankan…

Edition
-
ISBN/ISSN
--
Collation
xvii, 88 hal
Series Title
-
Call Number
2024 ANI p
Availability2
Add to basket
MARC DownloadCite
cover
Implementasi Sistem Penyimpanan Terdistribusi yang Aman serta Integrasi IPFS …
Comment Share
Dion OgiMohamad SyahralAgus Reza Aristiadi NurwaAlfian Putra Rakhmadani

Sidik jari sebagai data biometrik yang unik telah menjadi metode autentikasi umum karena kemudahannya dan tingkat akurasi yang tinggi dibandingkan dengan metode tradisional. Namun, penggunaannya membawa risiko privasi dan keamanan, terutama dengan penyimpanan data terpusat. Contohnya adalah peretasan yang terjadi pada server cloud milik AccuDoc Solutions, perusahaan pihak ketiga yang digunakan …

Edition
-
ISBN/ISSN
--
Collation
xvii, 92 hal
Series Title
-
Call Number
2024 ALF i
Availability2
Add to basket
MARC DownloadCite
First Page Previous 21 22 23 24 25 Next Last Page
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?