Follow
Amiruddin Amiruddin
Amiruddin Amiruddin
Sekolah Tinggi Sandi Negara/ Politeknik Siber dan Sandi Negara
Verified email at stsn-nci.ac.id - Homepage
Title
Cited by
Cited by
Year
Secure multi-protocol gateway for Internet of Things
A Amiruddin, AAP Ratna, R Harwahyu, RF Sari
2018 Wireless Telecommunications Symposium (WTS), 1-8, 2018
102018
Systematic Review of Internet of Things Security
A Amiruddin, AAP Ratna, RF Sari
International Journal of Communication Networks and Information Security …, 2019
92019
New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks
Amiruddin, AAP Ratna, RF Sari
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND INFORMATION SECURITY …, 2017
8*2017
Construction and Analysis of Key Generation Algorithms Based on Modified Fibonacci and Scrambling Factors for Privacy Preservation
A Amiruddin, AAP Ratna, RF Sari
International Journal of Network Security 21 (2), 250-258, 2019
62019
Design of Blockchain-Based Electronic Election System Using Hyperledger: Case of Indonesia
D Seftyanto, A Amiruddin, AR Hakim
2019 4th International Conference on Information Technology, Information …, 2020
52020
Exploration of the Security of Free Data Encryption Applications for Cloud Storage
EH Ramadhani, H Kabetta, A Amiruddin
IOP Conference Series: Materials Science and Engineering 1007, 2020
32020
A brief review of attacks and mitigations on smartphone infrastructure
R Setyawan, AA Rahayu, KFN Annisa, A Amiruddin
IOP Conference Series: Materials Science and Engineering 852 (2020), 7, 2020
32020
KAMIES: Security optimization of KASUMI algorithm by increasing diffusion level
M Salman, R Yugitama, Amiruddin, RF Sari
International Journal of Security and Its Applications 12 (3), 29-46, 2018
32018
A User Authentication Scheme Using Real-Time Location, QR-Code, and One Time Password: A Preliminary Work
AS Dewi, A Amiruddin
2018 International Conference on Electrical Engineering and Informatics …, 2018
32018
A testbed implementation of secure and lightweight privacy preservation mechanism using scrambled Fibonacci and XOR for ZigBee
Amiruddin, AAP Ratna, RF Sari
Region 10 Conference, TENCON 2017 - 2017 IEEE, 863 - 868, 2017
3*2017
Systematic Literature Review of Game-Based Learning: Objectives, Methods, Applications, Measurement Parameters, and Types of Games Multimedia and E-Learning
A Amiruddin, OC Briliyant, N Trianto
2nd International Conference on Informatics, Multimedia, Cyber, and …, 2021
22021
Securing Web-Based E-Voting System Using Captcha and SQL Injection Filter
A Amiruddin, AN Ramadhan, D Herdianto
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 14 (3), 11, 2020
22020
Lightweight Method for Detecting Fake Authentication Attack on Wi-Fi
MYB Setiadji, R Ibrahim, A Amiruddin
2019 6th International Conference on Electrical Engineering, Computer …, 2019
22019
Design and Theoretical Analysis of the Application of the Certificateless Public Key Encryption Scheme for Home Monitoring System Security
H Radifan, A Amiruddin
2019 IOP Conf. Ser.: Mater. Sci. Eng. 508 011001 508 (1), 6, 2019
22019
Development of a Secure Access Control System Based on Two-Factor Authentication Using Face Recognition and OTP SMS-Token
MD Pramana, A Lestyea, A Amiruddin
2020 International Conference on Informatics, Multimedia, Cyber and …, 2020
12020
Applying MAC Address-Based Access Control for Securing Admin's Login Page
BMPP Alam, R Septiasari, A Amiruddin
2019 6th International Conference on Electrical Engineering, Computer …, 2019
12019
A review of authentication protocols for rfid security on smart healthcare
HR Dearfian, A Amiruddin
2019 IOP Conf. Ser.: Mater. Sci. Eng. 508 011001 508 (1), 7, 2019
12019
Selecting key generating elliptic curves for Privacy Preserving Association Rule Mining (PPARM)
Amiruddin, RF Sari
Wireless and Mobile (APWiMob), 2015 IEEE Asia Pacific Conference on, 72-77, 2015
1*2015
Perancangan Spesifikasi Keamanan untuk Pengembangan Aplikasi Secure Chat Berdasarkan Common Criteria for IT Security Evaluation
A Amiruddin, MF Rohmani
Jurnal Teknologi Informasi dan Ilmu Komputer, Sinta 2 (S2) 8 (6), 1215-1226, 2021
2021
Utilizing Reverse Engineering Technique for A Malware Analysis Model
A Amiruddin, PNH Suryani, SD Santoso, MYB Setiadji
Scientific Journal of Informatics, Sinta 2 (S2) 8 (2), 229-242, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20