Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 235
21.
  • DATA REFINEMENT APPROACH FO... DATA REFINEMENT APPROACH FOR ANSWERING WHY-NOT PROBLEM OVER K-MOST PROMISING PRODUCT (K-MPP) QUERIES
    Permadi, Vynska Amalia; Ahmad, Tohari; Santoso, Bagus Jati JUTI (Jurnal Ilmiah Teknologi Informasi) (online), 10/2018, Letnik: 16, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    K-Most Promising (K-MPP) product is a strategy for selecting a product that used in the process of determining the most demanded products by consumers. The basic computations used to perform K-MPP ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
22.
  • Facile conversion of nitril... Facile conversion of nitrile to amide on polymers of intrinsic microporosity (PIM-1)
    Yanaranop, Paam; Santoso, Bagus; Etzion, Ron ... Polymer (Guilford), 08/2016, Letnik: 98
    Journal Article
    Recenzirano

    This paper presents an interesting new development in the area of chemical modification of PIM-1. The amide PIM-1 (named as PIM-CONH2) was synthesized by post-synthesis modification method using ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
23.
  • Verifiable Predicate Encryp... Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
    Yamada, Shota; Attrapadung, Nuttapong; Santoso, Bagus ... Public Key Cryptography – PKC 2012
    Book Chapter
    Recenzirano
    Odprti dostop

    In this paper, we focus on verifiability of predicate encryption. A verifiable predicate encryption scheme guarantees that all legitimate receivers of a ciphertext will obtain the same message upon ...
Celotno besedilo
24.
  • A Framework for Shannon Ciphers under Side-Channel Attacks: a Strong Converse and More
    Oohama, Yasutada; Santoso, Bagus 2022 IEEE International Symposium on Information Theory (ISIT), 06/2022
    Conference Proceeding

    We are interested in investigating the security of source encryption with a symmetric key under side-channel attacks. In this paper, we propose a general framework of source encryption with a ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
25.
  • A New ‘On the Fly’ Identifi... A New ‘On the Fly’ Identification Scheme: An Asymptoticity Trade-Off between ZK and Correctness
    SANTOSO, Bagus; OHTA, Kazuo IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009/01/01, 2009-00-00, 20090101, Letnik: E92.A, Številka: 1
    Journal Article
    Recenzirano

    GPS is an efficient identification (ID) scheme based on Schnorr ID scheme designed for applications where low cost devices with limited resources are used and a very-short authentication time is ...
Celotno besedilo
Dostopno za: NUK, UL, UM
26.
  • Penyusunan Panduan Pengelol... Penyusunan Panduan Pengelolaan Keamanan Informasi Untuk Firewall Configuration Berdasarkan Kerangka Kerja PCI DSS v.3.1 dan COBIT 5
    Santoso, Bagus Puji; Hariyanti, Eva; Wuryanto, Eto Journal of information systems engineering and business intelligence, 10/2016, Letnik: 2, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Abstrak — Keamanan informasi merupakan bagian dari sebuah sistem yang sangat penting untuk dijaga validitas dan integritas data serta menjamin ketersediaan layanan bagi penggunaannya. Sistem keamanan ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
27.
  • An Efficient Authentication... An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness
    SANTOSO, Bagus; OHTA, Kazuo; SAKIYAMA, Kazuo ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011/01/01, 2011-00-00, 20110101, Letnik: E94.A, Številka: 1
    Journal Article
    Recenzirano

    We present a new methodology for constructing an efficient identification scheme, and based on it, we propose a lightweight identification scheme whose computational and storage costs are ...
Celotno besedilo
Dostopno za: NUK, UL, UM
28.
  • Efikasi Diri dan Kesiapsiag... Efikasi Diri dan Kesiapsiagaan Perawat Rumah Sakit terhadap Bencana
    Lainsamputty, Ferdy; Purnawinadi, I Gede; Santoso, Raden Bagus Edy ... NERS Jurnal Keperawatan (Online), 03/2022, Letnik: 18, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Bencana bisa disebabkan oleh faktor alam, non alam, serta faktor manusia sehingga mengakibatkan timbulnya korban jiwa manusia, kerusakan lingkungan, kerugian harta benda, dan dampak psikologis. ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
29.
  • ANALISIS HUKUM DAMPAK BELUM... ANALISIS HUKUM DAMPAK BELUM DIRATIFIKASI KERANGKA KERJA KONVENSI PENGENDALIAN TEMBAKAU (FRAMEWORK CONVENTION ON TOBACCO CONTROL) BAGI INDONESIA
    Santoso, Aditia Bagus; Edorita, Widia; Diana, Ledy Fiat Justisia, 11/2015, Letnik: 8, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Framework Convention on Tobacco Control (FCTC) is an international treaty for tobacco control efforts for world health under the WHO. Indonesia has not ratified the treaty as far as the impact that ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
30.
Celotno besedilo
Dostopno za: IJS, KILJ, NUK, PNG, UL, UM
1 2 3 4 5
zadetkov: 235

Nalaganje filtrov