Kombinasi algoritma base64 dan caesar cipher pada aplikasi
(1) Universitas Mercu Buana
(2) Universitas Mercu Buana
(3) Universitas Mercu Buana
(4) Universitas Nusa Mandiri
(*) Corresponding Author
Abstract
Full Text:
PDF (Indonesian)References
H. T. S. Alrikabi and H. T. Hazim, “Enhanced Data Security of Communication System Using Combined Encryption and Steganography,” Int. J. Interact. Mob. Technol., vol. 15, no. 16, pp. 144–157, 2021, doi: 10.3991/ijim.v15i16.24557.
J. Zhu et al., “Enabling rack-scale confidential computing using heterogeneous trusted execution environment,” Proc. - IEEE Symp. Secur. Priv., vol. 2020-May, pp. 1450–1465, 2020, doi: 10.1109/SP40000.2020.00054.
C. Sharma, S. . Jain, and A. K. Sharma, “Explorative Study of SQL Injection Attacks and Mechanisms to Secure Web Application Database- A Review,” Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 3, pp. 79–87, 2016, doi: 10.14569/ijacsa.2016.070312.
R. Stofberg, C. M. Mabaso, and M. H. R. Bussin, “Employee responses to pay transparency,” SA J. Ind. Psychol., vol. 48, pp. 1–12, 2022, doi: 10.4102/sajip.v48i0.1906.
W. Przychodzen and F. Gómez-Bezares, “CEO–Employee Pay Gap, Productivity and Value Creation,” J. Risk Financ. Manag., vol. 14, no. 5, 2021, doi: 10.3390/jrfm14050196.
R. Aulia, A. Zakir, and D. A. Purwanto, “Penerapan Kombinasi Algoritma Base64 Dan Rot47 Untuk Enkripsi Database Pasien Rumah Sakit Jiwa Prof. Dr. Muhammad Ildrem,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 2, no. 2, pp. 146–151, 2018, doi: 10.30743/infotekjar.v2i2.300.
C. Wadisman, I. Nozomi, and S. Rahmawati, “PENGAMANAN DATABASE MENGGUNAKAN KOMBINASI ALGORITMA (CEST CRYPTOGRAPHY) DAN ALGORiTMA BASE64,” JURTEKSI (Jurnal Teknol. dan Sist. Informasi), vol. 7, no. 1, pp. 33–38, 2020, doi: 10.33330/jurteksi.v7i1.896.
E. Setyaningsih, “Keamanan file dokumen menggunakan algoritme Advanced Encryption Standard pada aplikasi berbasis Android,” Jnanaloka, pp. 11–23, 2020, doi: 10.36802/jnanaloka.2020.v1-no1-13.
P. Studi Teknik, K. Kunci, and P. Korespondensi, “Aplikasi Perpaduan Enkripsi Base64 Dengan Metode Steganografi Distrete Cosine Transform (Dct),” J. Sintaks Log., vol. 2, no. 2, pp. 37–45, 2022.
DOI: http://dx.doi.org/10.30998/faktorexacta.v17i1.20680
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.