MODIFIKASI KRIPTOGRAFI KLASIK VIGENERE CIPHER MENGGUNAKAN ONE TIME PAD DENGAN ENKRIPSI BERLANJUT
暂无分享,去创建一个
[1] Dale K. Pace,et al. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .
[2] Yan Shi,et al. Classification of Sputum Sounds Using Artificial Neural Network and Wavelet Transform , 2018, International journal of biological sciences.
[3] P. Pulli,et al. Tele-guidance based orientation and mobility system for visually impaired and blind persons , 2016 .
[4] Hanif Al Fatta,et al. PENGUJIAN USABILITY ANTARMUKA APLIKASI BRAILLE SMART PADA SISWA TU¬NANETRA , 2017 .
[5] Febi Nur Salisah,et al. ANALISIS KUALITAS LAYANAN E-COMMERCE TERHADAP KEPUASAN PELANGGAN MENGGUNAKAN METODE E-SERVQUAL (Studi Kasus: Lejel Home Shopping Pekanbaru) , 2016 .
[6] Ivo Colanus Rally Drajana. METODE SUPPORT VECTOR MACHINE DAN FORWARD SELECTION PREDIKSI PEMBAYARAN PEMBELIAN BAHAN BAKU KOPRA , 2017 .
[7] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[8] Alexander Lerch,et al. An Introduction to Audio Content Analysis: Applications in Signal Processing and Music Informatics , 2012 .
[9] Manvendra Singh,et al. Speech Recognition Using Neural Networks , 2011 .
[10] M Nithin,et al. Classification of Arrhythmia using Wavelet Transform and Neural Network Model , 2018 .
[11] Joko Riyanto. Perbandingan Metode Weighted Product (WP) dan Simple Additive Weighting (SAW) Penilaian Kinerja Guru pada Madrasah Ibtidaiyah Negeri 3 Jakarta , 2017 .
[12] Jonathan Vestin. Quality of Service Analysis for CloudMAC , 2014 .
[13] C. Yeh. A Problem‐based Selection of Multi‐attribute Decision‐making Methods , 2002 .
[14] Yudi Prayudi,et al. Studi dan Analisis Algoritma Rivest Code 6 (RC6) dalam Enkripsi/Dekripsi Data , 2005 .
[15] Vinh Pham,et al. Performing Gateway Load Balancing in MANETs , 2012 .
[16] Ely Setyo Astuti,et al. SISTEM PAKAR DETEKSI KERUSAKAN MESIN DIESEL PLTD MENGGUNAKAN METODE FORWARD CHAINING , 2016 .
[17] Yeni Melia. Multi Attribute Decision Making Using Simple Additive Weighting and Weighted Product in Investment , 2016 .
[18] Enaam Ghanem Saeed,et al. Arabic Word Recognition Using Wavelet Neural Network , 2010 .
[19] Faramarz Sadeghi,et al. Designing and Implementing of Intelligent Emotional Speech Recognition with Wavelet and Neural Network , 2016 .
[20] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[21] Zulkifli Matondang,et al. VALIDITAS DAN RELIABILITAS SUATU INSTRUMEN PENELITIAN , 2009 .
[22] Pri Priyono,et al. METODE PENELITIAN KUANTITATIF , 2008 .
[23] Mehmed Kantardzic,et al. Data-Mining Concepts , 2011 .
[24] Riska Nurtantyo Sarbini,et al. Menggunakan Metode Forward Chaining Berbasis Android , 2019 .
[25] Dendy Pratama,et al. Rancang Bangun Alat dan Aplikasi untuk Para Penyandang Tunanetra Berbasis Smartphone Android , 2016 .
[26] Eko Prasetyo,et al. Data Mining: Konsep dan Aplikasi menggunakan MATLAB , 2015 .
[27] M. Hakim. ANALISIS MODEL PENERIMAAN PENGGUNA SISTEM PELAPORAN PAJAK ONLINE , 2016 .
[28] Xiaoxu Yu,et al. A PSO-SVM-based 24 Hours Power Load Forecasting Model , 2015 .
[29] Fuguo Deng,et al. Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.
[30] Rachmat Trijono,et al. Metodologi Penelitian Kuantitatif , 2016 .
[31] Sugiyono. Metode Penelitian Kuantitatif Kualitatif dan R&D , 2012 .
[32] Phitsa Mauliana,et al. Sistem Pakar Diagnosis Kerusakan Mobil Toyota Kijang LSX Menggunakan Metode Forward Chaining , 2017 .
[33] Riki Siregar. Sistem Pakar Analisa Kerusakan Pada Sepeda Motor Honda Beat Injection Dengan Metode Backward Chaining , 2018 .
[34] Junyoung Heo,et al. Stock Price Prediction Based on Financial Statements Using SVM , 2016 .
[35] Frank Rubin,et al. One-Time Pad Cryptography , 1996, Cryptologia.
[37] C. Burrus,et al. Introduction to Wavelets and Wavelet Transforms: A Primer , 1997 .
[38] Ivan Paulov. Routing in a Virtualised Environment with RouterOS , 2015 .
[39] Mayank Kumar,et al. Equal Cost Multipath Routing in IP , 2014 .
[40] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.