yohan suryanto
Judul
Dikutip oleh
Dikutip oleh
Tahun
A new image encryption using color scrambling based on chaotic permutation multiple circular shrinking and expanding
Y Suryanto, K Ramli, Suryadi
Multimedia Tools and Applications 76 (15), 16831-16854, 2017
192017
A Secure and Robust Image Encryption Based on Chaotic Permutation Multiple Circular Shrinking and Expanding
Y Suryanto, Suryadi, K Ramli
Journal of Information Hiding and Multimedia Signal Processing 7 (No. 4), pp …, 2016
172016
On developing information security management system (isms) framework for iso 27001-based data center
D Achmadi, Y Suryanto, K Ramli
2018 International Workshop on Big Data and Information Security (IWBIS …, 2018
62018
Algoritma B217AN Menggunakan Metode Spread Spectrum Berbasis PCMK/PCMB
SR Widianto, Y Suryanto
Seminar Nasional Teknik Elektro Politeknik Negeri Jakarta. Depok 5 (2), 216-223, 2020
42020
Chaos properties of the chaotic permutation generated by multi circular shrinking and expanding movement
Y Suryanto, K Ramli
2015 International Conference on Quality in Research (QiR), 65-68, 2015
42015
Potential development of AES 128-bit key generation for LoRaWAN security
N Hayati, K Ramli, M Suryanegara, Y Suryanto
2019 2nd International Conference on Communication Engineering and …, 2019
32019
Risk Assessment Using NIST SP 800-30 Revision 1 and ISO 27005 Combination Technique in Profit-Based Organization: Case Study of ZZZ Information System Application in ABC Agency
M Al Fikri, FA Putra, Y Suryanto, K Ramli
Procedia Computer Science 161, 1206-1215, 2019
22019
Implementation and Performance Analysis of Reliable and Secure End to End Voice Encryption over Public Mobile Network Based on Frequency Domain Using Dual Processor in FPGA …
Y Suryanto, K Ramli
International Journal of Computer Technology and Applications 5 (1), 103, 2014
22014
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
N Hayati, Y Suryanto, K Ramli, M Suryanegara
2019 2nd International Conference on Communication Engineering and …, 2019
12019
Performance analysis on iris recognition based on half polar iris localization and normalization method using modified low cost camera
K Ramli, R Nurhadi, Y Suryanto, A Presekal
2017 15th International Conference on Quality in Research (QiR …, 2017
12017
Performance Comparison of TCP Spoofing and End to End Approach to Enable Partial QoS on IP Based Network
Y Suryanto, RR Nasser, RF Sari
International Journal of Computers Communications & Control 10 (3), 403-419, 2015
12015
Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography
Y Suryanto, N Hayati, RH Kusumawardhana, RF Sari
Int. J. Computer Technology & Applications 4 (1), 43-50, 2013
12013
Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography
Y Suryanto, N Hayati, RH Kusumawardhana, RF Sari
Int. J. Computer Technology & Applications 4 (1), 43-50, 2013
12013
Novel Image Encryption Using a Pseudoset Generated by Chaotic Permutation Multicircular Shrinking With a Gradual Deletion of the Input Set
K Ramli, Y Suryanto, N Hayati
IEEE Access 8, 110351-110361, 2020
2020
Risk Management in Data Centers Using ISO 31000: 2018 Case Study: XYZ Agency
A Syihabuddin, Y Suryanto, M Salman
Science, Technology, Engineering, Economics, Education, and Mathematics 1 (1), 2020
2020
Speech Enhancement for Secure Communication Using Coupled Spectral Subtraction and Wiener Filter
H Pardede, K Ramli, Y Suryanto, N Hayati, A Presekal
Electronics 8 (8), 897, 2019
2019
A COBIT-Based Critical Asset Evaluation of Electronic Certificate Management in Central, Urban, and Rural Government Agencies: Study and Analysis
Y Suryanto, K Ramli
2018 International Conference on ICT for Rural Development (IC-ICTRuDev), 98-104, 2018
2018
Badar Agung Nugroho, 81 Bayu Waseso, 69
B Syihabuddin, C Juditha, CSD Takariani, DA Sujiansyah, DI Sensuse, ...
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–18