Ikuti
ari moesriami barmawi
ari moesriami barmawi
Email yang diverifikasi di telkomuniversity.ac.id
Judul
Dikutip oleh
Dikutip oleh
Tahun
Exploiting the error correction mechanism in QR codes for secret sharing
YW Chow, W Susilo, G Yang, JG Phillips, I Pranata, AM Barmawi
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
822016
Comparison between fingerprint and winnowing algorithm to detect plagiarism fraud on Bahasa Indonesia documents
AT Wibowo, KW Sudarmadi, AM Barmawi
2013 International Conference of Information and Communication Technology …, 2013
332013
A visual one-time password authentication scheme using mobile devices
YW Chow, W Susilo, MH Au, AM Barmawi
Information and Communications Security: 16th International Conference …, 2015
192015
Improving Data Hiding Capacity in Code Based Steganography using Multiple Embedding.
KA Kingsley, AM Barmawi
J. Inf. Hiding Multim. Signal Process. 11 (1), 14-43, 2020
82020
Paraphrasing method based on contextual synonym substitution
AM Barmawi, A Muhammad
Journal of ICT Research and Applications 13 (3), 257, 2019
72019
Malaria incidence forecasting from incidence record and weather pattern using polynomial neural network
A Arifianto, AM Barmawi, AT Wibowo
International Journal of Future Computer and Communication 3 (1), 60, 2014
72014
Digital contract using block chaining and elliptic curve based digital signature
SA Kalamsyah, AM Barmawi, M Arzaki
2018 6th International Conference on Information and Communication …, 2018
62018
Watermarking QR code
AM Barmawi, FA Yulianto
2015 2nd International Conference on Information Science and Security (ICISS …, 2015
62015
List steganography based on syllable patterns
D Martin, AM Barmawi
2015 International Conference on Electrical Engineering and Informatics …, 2015
62015
Non-relevant document reduction in anti-plagiarism using asymmetric similarity and AVL tree index
A Oktoveri, AT Wibowo, AM Barmawi
2014 5th international conference on intelligent and advanced systems (ICIAS …, 2014
62014
Increasing Secret Data Hiding Capacity in QR Code Using Subcells
W Erlangga, AM Barmawi
International Workshop on Digital Watermarking, 327-342, 2016
52016
Linguistic based steganography using lexical substitution and syntactical transformation
A Barmawi
2016 6th International Conference on IT Convergence and Security (ICITCS), 1-6, 2016
42016
Strengthening fawkescoin against double spending attack using merkle tree
W Wirachantika, AM Barmawi, BA Wahyudi
Proceedings of the 3rd International Conference on Cryptography, Security …, 2019
32019
Improving NORMALS Using Modified Baudot-Murray Code
A Wibowo, AM Barmawi
Proceedings of the 6th International Conference on Communication and Network …, 2016
32016
Strengthening Crypto-1 cipher against algebraic attacks
F Afianti, AM Barmawi
Journal of ICT Research and Applications 9 (1), 88-110, 2015
32015
A proposal for generating shared RSA parameters
AM Barmwai, S Takada, N Doi
Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing …, 1999
31999
Augmented encrypted key exchange using rsa encryption
AM Barmawi, S Takada, N Doi
Proceedings of 8th International Symposium on Personal, Indoor and Mobile …, 1997
31997
Protecting author royalty of digital assets using blockchain and elliptic curve cryptography
MIS Ayasy, AM Barmawi
2022 International Conference on Green Energy, Computing and Sustainable …, 2022
22022
Column-Level Database Encryption Using Rijndael Algorithm and Dynamic Key on Learning Management System
AS Mursalat, AM Barmawi, PE Yunanto
Indonesia Journal on Computing (Indo-JC) 7 (1), 15-30, 2022
22022
Permutation Modification of Reversible Data Hiding Using Difference Histogram Shifting in Encrypted Medical Image
MF Putranto, AM Barmawi, BA Wahyudi
Procedia Computer Science 135, 727-735, 2018
22018
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20