yohan suryanto
JudulDikutip olehTahun
A new image encryption using color scrambling based on chaotic permutation multiple circular shrinking and expanding
Y Suryanto, K Ramli, Suryadi
Multimedia Tools and Applications 76 (15), 16831-16854, 2017
112017
A Secure and Robust Image Encryption Based on Chaotic Permutation Multiple Circular Shrinking and Expanding
Y Suryanto, Suryadi, K Ramli
Journal of Information Hiding and Multimedia Signal Processing 7 (No. 4), pp …, 2016
112016
Chaos properties of the chaotic permutation generated by multi circular shrinking and expanding movement
Y Suryanto, K Ramli
2015 International Conference on Quality in Research (QiR), 65-68, 2015
32015
On Developing Information Security Management System (ISMS) Framework for ISO 27001-based Data Center
D Achmadi, Y Suryanto, K Ramli
2018 International Workshop on Big Data and Information Security (IWBIS …, 2018
22018
Implementation and Performance Analysis of Reliable and Secure End to End Voice Encryption over Public Mobile Network Based on Frequency Domain Using Dual Processor in FPGA …
Y Suryanto, K Ramli
International Journal of Computer Technology and Applications 5 (1), 103, 2014
22014
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
N Hayati, Y Suryanto, K Ramli, M Suryanegara
2019 2nd International Conference on Communication Engineering and …, 2019
12019
Performance analysis on iris recognition based on half polar iris localization and normalization method using modified low cost camera
K Ramli, R Nurhadi, Y Suryanto, A Presekal
2017 15th International Conference on Quality in Research (QiR …, 2017
12017
Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography
Y Suryanto, N Hayati, RH Kusumawardhana, RF Sari
Int. J. Computer Technology & Applications 4 (1), 43-50, 2013
12013
Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography
Y Suryanto, N Hayati, RH Kusumawardhana, RF Sari
Int. J. Computer Technology & Applications 4 (1), 43-50, 2013
12013
Speech Enhancement for Secure Communication Using Coupled Spectral Subtraction and Wiener Filter
H Pardede, K Ramli, Y Suryanto, N Hayati, A Presekal
Electronics 8 (8), 897, 2019
2019
Potential Development of AES 128-bit Key Generation for LoRaWAN Security
N Hayati, K Ramli, M Suryanegara, Y Suryanto
2019 2nd International Conference on Communication Engineering and …, 2019
2019
A COBIT-Based Critical Asset Evaluation of Electronic Certificate Management in Central, Urban, and Rural Government Agencies: Study and Analysis
Y Suryanto, K Ramli
2018 International Conference on ICT for Rural Development (IC-ICTRuDev), 98-104, 2018
2018
Performance Comparison of TCP Spoofing and End to End Approach to Enable Partial QoS on IP Based Network
Y Suryanto, RR Nasser, RF Sari
International Journal of Computers Communications & Control 10 (3), 403-419, 2015
2015
Badar Agung Nugroho, 81 Bayu Waseso, 69
B Syihabuddin, C Juditha, CSD Takariani, DA Sujiansyah, DI Sensuse, ...
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–14