Exploiting the error correction mechanism in QR codes for secret sharing YW Chow, W Susilo, G Yang, JG Phillips, I Pranata, AM Barmawi Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 82 | 2016 |
Comparison between fingerprint and winnowing algorithm to detect plagiarism fraud on Bahasa Indonesia documents AT Wibowo, KW Sudarmadi, AM Barmawi 2013 International Conference of Information and Communication Technology …, 2013 | 33 | 2013 |
A visual one-time password authentication scheme using mobile devices YW Chow, W Susilo, MH Au, AM Barmawi Information and Communications Security: 16th International Conference …, 2015 | 19 | 2015 |
Improving Data Hiding Capacity in Code Based Steganography using Multiple Embedding. KA Kingsley, AM Barmawi J. Inf. Hiding Multim. Signal Process. 11 (1), 14-43, 2020 | 8 | 2020 |
Paraphrasing method based on contextual synonym substitution AM Barmawi, A Muhammad Journal of ICT Research and Applications 13 (3), 257, 2019 | 7 | 2019 |
Malaria incidence forecasting from incidence record and weather pattern using polynomial neural network A Arifianto, AM Barmawi, AT Wibowo International Journal of Future Computer and Communication 3 (1), 60, 2014 | 7 | 2014 |
Digital contract using block chaining and elliptic curve based digital signature SA Kalamsyah, AM Barmawi, M Arzaki 2018 6th International Conference on Information and Communication …, 2018 | 6 | 2018 |
Watermarking QR code AM Barmawi, FA Yulianto 2015 2nd International Conference on Information Science and Security (ICISS …, 2015 | 6 | 2015 |
List steganography based on syllable patterns D Martin, AM Barmawi 2015 International Conference on Electrical Engineering and Informatics …, 2015 | 6 | 2015 |
Non-relevant document reduction in anti-plagiarism using asymmetric similarity and AVL tree index A Oktoveri, AT Wibowo, AM Barmawi 2014 5th international conference on intelligent and advanced systems (ICIAS …, 2014 | 6 | 2014 |
Increasing Secret Data Hiding Capacity in QR Code Using Subcells W Erlangga, AM Barmawi International Workshop on Digital Watermarking, 327-342, 2016 | 5 | 2016 |
Linguistic based steganography using lexical substitution and syntactical transformation A Barmawi 2016 6th International Conference on IT Convergence and Security (ICITCS), 1-6, 2016 | 4 | 2016 |
Strengthening fawkescoin against double spending attack using merkle tree W Wirachantika, AM Barmawi, BA Wahyudi Proceedings of the 3rd International Conference on Cryptography, Security …, 2019 | 3 | 2019 |
Improving NORMALS Using Modified Baudot-Murray Code A Wibowo, AM Barmawi Proceedings of the 6th International Conference on Communication and Network …, 2016 | 3 | 2016 |
Strengthening Crypto-1 cipher against algebraic attacks F Afianti, AM Barmawi Journal of ICT Research and Applications 9 (1), 88-110, 2015 | 3 | 2015 |
A proposal for generating shared RSA parameters AM Barmwai, S Takada, N Doi Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing …, 1999 | 3 | 1999 |
Augmented encrypted key exchange using rsa encryption AM Barmawi, S Takada, N Doi Proceedings of 8th International Symposium on Personal, Indoor and Mobile …, 1997 | 3 | 1997 |
Protecting author royalty of digital assets using blockchain and elliptic curve cryptography MIS Ayasy, AM Barmawi 2022 International Conference on Green Energy, Computing and Sustainable …, 2022 | 2 | 2022 |
Column-Level Database Encryption Using Rijndael Algorithm and Dynamic Key on Learning Management System AS Mursalat, AM Barmawi, PE Yunanto Indonesia Journal on Computing (Indo-JC) 7 (1), 15-30, 2022 | 2 | 2022 |
Permutation Modification of Reversible Data Hiding Using Difference Histogram Shifting in Encrypted Medical Image MF Putranto, AM Barmawi, BA Wahyudi Procedia Computer Science 135, 727-735, 2018 | 2 | 2018 |