Kriptografi untuk keamanan jaringan R Sadikin Andi, 2019 | 329 | 2019 |
Circle detection based on hough transform and Mexican Hat filter NH Lestriandoko, R Sadikin 2016 International conference on computer, control, informatics and its …, 2016 | 16 | 2016 |
A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure. S Rifki, Y Park, S Moon J. Inf. Sci. Eng. 31 (1), 247-265, 2015 | 5 | 2015 |
Universal composability notion for functional encryption schemes R Sadikin, YH Park, KH Park, SJ Moon Journal of the Korea Industrial Information Systems Research 18 (3), 17-26, 2013 | 4 | 2013 |
Evaluation of Random Forest model for forest fire prediction based on climatology over Borneo AL Latifah, A Shabrina, IN Wahyuni, R Sadikin 2019 International Conference on Computer, Control, Informatics and Its …, 2019 | 3 | 2019 |
Processing next generation sequencing data in map-reduce framework using hadoop-BAM in a computer cluster R Sadikin, A Arisal, R Omar, NH Mazni 2017 2nd International conferences on Information Technology, Information …, 2017 | 3 | 2017 |
Deep architectures for super-symmetric particle classification with noise labelling I Ni'mah, R Sadikin 2016 International Conference on Computer, Control, Informatics and its …, 2016 | 3 | 2016 |
How indonesia uses big data ‘indonesian one data’for the future of policy making PB Putera, LP Manik, Y Rianto, AA Sari, R Sadikin Int. J. Adv. Sci. Technol. 29 (5), 2177-2185, 2020 | 2 | 2020 |
Cubic spline interpolation for large regular 3D grid in cylindrical coordinate R Sadikin, IWA Swardiana, T Wirahman 2017 International Conference on Computer, Control, Informatics and its …, 2017 | 2 | 2017 |
Mosquito population dynamics from cellular automata-based simulation I Syafarina, R Sadikin, N Nuraini AIP Conference Proceedings 1705 (1), 020051, 2016 | 1 | 2016 |
On comparison of multigrid cycles for poisson solver in polar plane coordinates N Masthurah, I Ni'mah, FH Muttaqien, R Sadikin 2015 9th International Conference on Telecommunication Systems Services and …, 2015 | 1 | 2015 |
Ciphertext Policy-Attribute Based Encryption with Non Monotonic Access Structures R Sadikin, SJ Moon, YH Park 전자공학회논문지 50 (9), 21-31, 2013 | 1 | 2013 |
Design of Smartcard’s Mutual Authentication Using Zero Knowledge Protocol NH Lestriandoko, R Sadikin Proceedings of 4th International Conference on Information Communication …, 2008 | 1 | 2008 |
Irregular Grid Interpolation using Radial Basis Function for Large Cylindrical Volume SB Iryanto, FH Muttaqien, R Sadikin Jurnal Ilmu Komputer dan Informasi 13 (1), 17-23, 2020 | | 2020 |
Simplified Methods of Particle Trajectory Generation in Time Projection Chamber for Machine Learning Based Particle Momentum Classification MA Dobson, R Sadikin 2018 3rd International Conference on Information Technology, Information …, 2018 | | 2018 |
GPU-accelerated protein sequence alignment for Jamu prediction SB Iryanto, WA Kusuma, R Sadikin, IWA Swardiana 2017 International Conference on Computer, Control, Informatics and its …, 2017 | | 2017 |
An Efficient Parallel Algorithm for Simpson Cumulative Integration on GPU IWA Swardiana, T Wirahman, R Sadikin 2015 Third International Symposium on Computing and Networking (CANDAR), 346-349, 2015 | | 2015 |
LIPI’s Contribution in TPC NH Lestriandoko, I Nurhayati Masthurah, DR Ni’mah, R Sadikin, ... | | 2015 |
Secure Inner Product Encryption Scheme with Attribute Hiding in Bilinear Groups R Sadikin, YH Park Journal of the Institute of Electronics and Information Engineers 51 (1), 57-70, 2014 | | 2014 |
Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme R Sadikin, YH Park, KH Park Journal of the Korea Industrial Information Systems Research 19 (1), 1-12, 2014 | | 2014 |