Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 17201 dokumen yang sesuai dengan query
cover
"This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption, special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes."
Heidelberg: Springer, 2012
e20410303
eBooks  Universitas Indonesia Library
cover
Leonardus Wijaya
"Sistem pemungutan suara konvensional masih merupakan metode utama yang digunakan dalam pemilihan umum dewasa ini. Terdapat banyak kelemahan pada sistem manual ini seperti sampah kertas hasil surat suara yang banyak, sumber daya manusia yang terlalu dibebani, penanganan logistik yang kompleks dan tidak tepat sasaran, dan keamanan yang masih dipertanyakan. Surat suara merupakan informasi yang sangat penting dan harus mendapatkan perlindungan keamanan tertinggi agar hasil pemungutan suara dapat memenuhi persyaratan, jujur, sah dan adil. Teknologi yang terus berkembang hadir sebagai salah satu solusi dari permasalahan sistem pemungutan suara manual terutama pada aspek keamanan dan integritas data suara. Penelitian ini mengimplementasi image steganography dan RSA public key cryptography sebagai satu dari dua langkah pengamanan surat suara dalam pemungutan suara elektronik (Electronic Voting/e-vote) sebagai metode pengelabuan. Teknologi blockchain dengan platform Ethereum digabungkan sebagai langkah pengamanan untuk membentuk sistem e-vote yang transparan, aman, dan mampu menjaga integritas suara. Simulasi dilakukan secara lokal dengan menggunakan aplikasi web berbasis microframework flask. Jaringan blockchain dibentuk secara virtual dengan bantuan aplikasi Ganache. Simulasi dengan menggunakan 1000 data masukan kepada sistem secara berurutan dan waktu yang dibutuhkan untuk memproses seluruh data sebesar 8435,54 detik (setara dengan 2 jam 20 menit 35,54 detik) dengan waktu pemrosesan rata-rata 8,43 detik per masukan dan untuk merekapitulasi data tersebut dibutuhkan waktu 2308.62 detik (setara dengan 38 menit 28.62 detik) dengan waktu pemrosesan rata-rata 2.31 detik per data. Sistem blockchain mengakibatkan terjadinya kelambatan waktu (delay) sebesar 29% dari waktu pemrosesan rata-rata di dalam batas lingkungan simulasi, namun suara yang diberikan oleh para pemilih dapat dilindungi sangat ketat. Kunci RSA yang digunakan sepanjang 2048-bit melebihi batas keamanan yang biasa digunakan. Hasil citra rekonstruksi steganografi memiliki nilai PSNR 106,98% lebih tinggi dibandingkan metode pembanding lainnya. Metode kombinasi ini menghasilkan sistem pemilihan elektronik yang memiliki metode pengamanan tinggi dan efisien dari segi waktu dan sumber daya manusia.

Conventional voting systems are still used as the main approach for general elections these days. Various drawbacks of this manual system have been brought upon, such as excessive paper litter from the used ballot, overworked human resources, all over the place logistics, and controversial security. Ballot hold essential information, and it needs maximal protection against tampering to prove the result of such voting are legal and just. Growth in technology offers one such solution to serve as a better alternative against manual voting systems, especially on security and preserving data integrity. This research will focus on implementing combined Image Steganography and RSA Public Key Cryptography as a deception method and Ethereum Blockchain platform to develop a transparent, safe, and robust Electronic Voting System while maintaining data integrity. Simulations are run locally using a web application based on the flask microframework. A virtual blockchain network is created with the help of the Ganache application. Simulations were carried out using 1000 input data sequentially with the total time needed to process all the inputs are 8435.54 seconds (equivalent to 2 hours 20 minutes 35.54 seconds) with an average processing time of 8.43 seconds per input and to recapitulate the data took 2308.62 seconds (equivalent to 38 minutes 28.62 seconds) with an average processing time of 2.31 seconds per data. The blockchain system resulted in a 29% delay of the average processing time within the simulation environment limits, but the votes can be strictly protected. The 2048-bit RSA key used exceeds the usual security limit. The results of the steganographic reconstruction image have a PSNR value of 106.98% higher than other comparison methods. This combination method produces an electronic voting system that has a high-security method and is efficient in terms of time and human resources."
Depok: Fakultas Teknik Universitas Indonesia, 2021
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
"Key Concepts in Public Health identifies fifty key concepts used across the discipline of public health in order to give the reader a broad perspective of the core topics relevant to training and practice. From epidemiology to health promotion, and ethics to leadership, the book offers an exciting guide to the multi professional field. Each entry features a snapshot definition of the concept, a broader discussion addressing the main issues and links to practice, key points relevant to the entry, case studies to illustrate the application to practice, and examples of further reading."
London: Sage Publications, 2012
e20502476
eBooks  Universitas Indonesia Library
cover
Dwi Agy Jatmiko
"Kriptografi kunci publik merupakan salah satu teknik kriptografi untuk mengamankan transmisi informasi. Pertukaran kunci Diffie-Hellman dan sistem kriptografi ElGamal merupakan dua teknik kriptografi kunci publik yang didasarkan pada Discrete Logarithm Problem (DLP). Pesatnya perkembangan komputer belakangan ini menuntut penggunaan keysize yang relatif besar untuk menjaga tingkat keamanan transmisi informasi melalui pertukaran kunci Diffie-Hellman dan sistem kriptografi ElGamal. Di dalam tugas akhir ini, akan dijelaskan mengenai penerapan kurva eliptis pada pertukaran kunci Diffie-Hellman dan sistem kriptografi ElGamal. Diharapkan penerapan kurva eliptis dapat memberikan tingkat keamanan transmisi informasi yang tinggi namun dengan penggunaan keysize yang relatif lebih kecil.

Public key cryptography is one of cryptographic techniques for securing information transmission. Diffie-Hellman key exchange dan ElGamal Cryptosystem are public key cryptography techniques that based on Discrete Logarithm Problem (DLP). Recent rapid-growing of computer made information transmission using Diffie-Hellman key exchange dan ElGamal cryptosystem have to use a relative large keysize to keep its security level. This skripsi will explain about elliptic curve implementation in Diffie-Hellman key exchange dan ElGamal Cryptosystem. Elliptic curve implementation expected to give higher security level in information transmission althought using relative small keysize."
Depok: Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Indonesia, 2012
S53056
UI - Skripsi Membership  Universitas Indonesia Library
cover
cover
Rachman
Mataram: Universitas Mataram Press, 2004
001.5 RAC p
Buku Teks SO  Universitas Indonesia Library
cover
"This book is in many ways a manual for the public health decathlete, although
the editors have gone much further by including 15, not 10, items. These items cover
many of the contemporary challenges confronting population health. Seven chapters
review the changing burden of disease and injury, providing many examples of
the tremendous successes of the public health community. The most celebrated have
been those in the struggle against communicable disease, with the authors noting
achievements in transforming acquired immune deficiency syndrome (AIDS) into
a condition that those infected die with rather than from. However, there are others,
less well-recognised, such as the 50 % decline in mortality from cardiovascular
disease in North Western Europe in the past four decades. Yet, as the authors of all
of these chapters note, progress is not inevitable. Communicable diseases that once
seemed to be coming under control are reappearing, such as tuberculosis, but now
in a much more alarming drug-resistant form. Indeed, antimicrobial resistance is
now recognised as a global threat, potentially posing an existential threat to humanity,
just like climate change. Failure by governments to act against the vectors of
non-communicable disease, and especially the major corporations that profit from
sales of unhealthy products, for example by placing considerations of health above
those of trade liberalisation, has permitted the spread of obesogenic and alcogenic
environments, with profound consequences for our future health."
Switzerland: Springer International Publishing, 2015
e20528445
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012, held in Darmstadt, Germany, May 2012. The 16 revised full papers presented together with two invited talks were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on practical side-channel analysis, secure design, side-channel attacks on RSA, fault attacks, side-channel attacks on ECC, and different methods in side-channel analysis."
Berlin : Springer-Verlag, 2012
e20410488
eBooks  Universitas Indonesia Library
cover
Prest, A.R.
Woreester: English Language Book Society, 1974
336.73 PRE p
Buku Teks  Universitas Indonesia Library
cover
Musgrave, Richard A.
New York: McGraw-Hill, 1983
336.73 MUS p
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>