Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 88 from your keywords: subject="Encryption"
First Page Previous 6 7 8 9
cover
Everyday cryptography : fundamental principles and applications
Comment Share
Martin, Keith M

Machine generated contents note: pt. I Setting the Scene 1.Basic Principles 1.1.Why Information security? 1.2.Security risks 1.3.Security services 1.4.Fundamentals of cryptosystems 1.5.Cryptosystem security assumptions 1.6.Breaking cryptosystems 1.7.Summary 1.8.Further reading 1.9.Activities 2.Historical Cryptosystems 2.1.Monoalphabetic ciphers 2.2.Historical advance…

Edition
-
ISBN/ISSN
9780199695591
Collation
xxi, 530 hlm.: ilus.; 23 cm.
Series Title
-
Call Number
652.8 MAR e
Availability1
Add to basket
MARC DownloadCite
cover
KAJIAN MATEMATIS PEMANFAATAN QUADRATIC RESIDUE PADA SKEMA CLIFFORD COCKS' IDE…
Comment Share
SITI ZAIMRahmi Rusin, S.Si, M Sc tech.

Identity based encryption merupakan algoritma asimetrik yang menggunakan identitas sebagai kunci publik. Pada tahum 2001, Clifford Cocks mengajukan Identity Based Encryption Scheme Based on Quadratic Residues. Pada penelitian tugas akhir ini dilakukan pengkajian secara matematis terhadap quadratic residue pada skema tersebut dan dibuat simulasi setiap tahapan pada skema tersebut mengg…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
TUGAS AKHIR
Call Number
2009 SIT k
Availability0
Add to basket
MARC DownloadCite
cover
PENERAPAN IDENTITY BASED FUNGSI ENCRYPTION DENGAN FUNGSI TATE PAIRING PADA LO…
Comment Share
RIKSON GULTOM

Aplikasi di internet dapat digunakan oleh siapa saja yang tersambung ke jaringan tersebut. User dapat menggunakan aplikasi internet, bila yang bersangkutan memiliki hak akses. Salah satu perlindungan keamanan akses penggunaan aplikasi adalah dengan menggunakan login. Tetapi, teknik login biasa memiliki beberapa kelemahan, antara lain rentan terhadap pencurian password dengan menggunakan teknik…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
TUGAS AKHIR
Call Number
2009 RIK p
Availability0
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Hankerson, DarrelMenezes, AlfredStallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 …

Edition
Fifth Edition
ISBN/ISSN
9780137056323
Collation
743 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 STA c
Availability4
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 …

Edition
Sixth Edition
ISBN/ISSN
9780133354690
Collation
xix, 731 hlm.; ilus.; 24 cm.
Series Title
null
Call Number
005.82 STA c
Availability1
Add to basket
MARC DownloadCite
cover
Cryptography and network security
Comment Share
Stallings, William

Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS:
Chapter 1 Overview
< >1.1 Computer Security Concepts
< >1.2 The OSI Security Architecture
< >1.3 Security Attacks
< >1.4 Security Services
< >1.5 Security Mechanisms
< >1.6 A Model for Network Security
< >1.7 Recommended Reading
< >1.8 …

Edition
Fifth Edition
ISBN/ISSN
9780137056323
Collation
743 hlm.; ilus.; 23 cm.
Series Title
null
Call Number
005.82 STA c
Availability6
Add to basket
MARC DownloadCite
cover
Encryption as an Enterprise Strategy: an Ians Custom Report
Comment Share
Shackleford, DaveInstitute for Applied Network Security

In the last ten years, the number of data breaches and major cases involving sensitive data exposure have grown dramatically. Starting in 2005 with the ChoicePoint breach, we’ve seen a steady increase of data breaches that have exposed payment card information, healthcare records, personally identifiable information (PII), passwords and other authentication details, and more. Major breaches h…

Edition
-
ISBN/ISSN
-
Collation
13 hlm.; pdf;
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Internet Cryptography
Comment Share
Smith, Richard E.

Edition
Cet. 5
ISBN/ISSN
201924803
Collation
xx, 356 hlm., ilus.,
Series Title
-
Call Number
652.8 SMI i

Edition
Cet. 5
ISBN/ISSN
201924803
Collation
xx, 356 hlm., ilus.,
Series Title
-
Call Number
652.8 SMI i
Availability0
Add to basket
MARC DownloadCite
First Page Previous 6 7 8 9
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?