is security
Recently Published Documents


TOTAL DOCUMENTS

252
(FIVE YEARS 71)

H-INDEX

18
(FIVE YEARS 1)

Author(s):  
Biljana Gavrilović ◽  

The subject of the analysis is security measures according to the Yugoslav Criminal Code from 1929. Namely, the importance of the analysis of security measures from the Criminal Code from 1929 is reflected in the fact that it made a turning point in the development of criminal law in Serbia, given that it for the first time had prescribed security measures in the register of criminal sanctions. Therefore, the goal is to point out the bases on which the current system of criminal sanctions is built, through the analysis of security measures from the Criminal Code from 1929.


2021 ◽  
Vol 2 (2) ◽  
pp. 18-24
Author(s):  
I Gede Bagus Premana Putra ◽  
I Putu Agus Eka Pratama

Hotspot is one form of utilizing Wireless LAN technology that can be used to access internet services and is usually found in public areas such as libraries, campus internet parks, or offices. Aspects that need to be considered in hotspots to make users feel comfortable is security then at the provider side, the aspect that needs to be considered is the regulation of bandwidth allocation to optimize the data transfer speeds that the network and to prevent the possibility of dense network traffic. RADIUS server is one type of server that can be used at hotspots to secure hotspots because it supports various types of encryption. In this study, optimization of the settings for hotspot network bandwidth is optimized by integrating the RADIUS server with RouterOS. Bandwidth allocation management is done by determining the active time of a user account and set quotas hotspot uploads and downloads for the account. The results obtained from this study indicate that when a hotspot user account has passed the active time or has passed the upload quota and the download given, the account will be deleted from the list of hotspot user accounts or disabled.


2021 ◽  
Vol 10 (3) ◽  
pp. 78-85
Author(s):  
Ismail Sati Alom Harahap

One aspect of success in data communication is security. Data security can be done by using steganography. Steganography is a way to hide messages in the media in such a way that other people do not realize there is a message in the media. Many of the algorithms used in steganography one of which is the Least Significant Bit. In this research, the authors modify Least Significant Bit algorithms with Alternate Insertion method. Modification is doing of embedding and extracting messages process by changing the RGB values ??at each pixel of image data with confidential file by inserting message alternately and insertionly until the all message inserted. This steganography applications have input password that is used as the key of a message can't be opened in addition to the addressee so that the data will be kept confidential. The parameters used to measure the performance of the Least Significant Bit and Alternate Insertion are using runtime program and analysist algorithms of Big . The message insertion applications built by using C# (C Sharp) programming language. From the results of research that extracting process messages work faster than the embedding process. More larger of image in used it will be spend longer time to process the inserting message. Time complexity of algorithms (Big ) embedding and extracting processes obtained in testing the system is T (n) = (xy). From the results of research that extracting process messages work faster than the embedding process. More larger of image in used it will be spend longer time to process the inserting message. Time complexity of algorithms (Big ) embedding and extracting processes obtained in testing the system is T (n) = (xy). From the results of research that extracting process messages work faster than the embedding process. More larger of image in used it will be spend longer time to process the inserting message. Time complexity of algorithms (Big ) embedding and extracting processes obtained in testing the system is T (n) = (xy).


Author(s):  
Imane Sahmi ◽  
Abderrahim Abdellaoui ◽  
Tomader Mazri ◽  
Nabil Hmina

The big challenge to raise for deploying the application's domain of the Internet of Things is security. As one of the popular messaging protocols in the IoT world, the message queue telemetry transport (MQTT) is designed for constrained devices and machine-to-machine communications, based on the publish-subscribe model, it offers a basic authentication using username and password. However, this authentication method might have a problem in terms of security and scalability. In this paper, we provide an analysis of the current research in the literature related to the security for the MQTT protocol, before we give a brief description of each algorithm used on our approach, to finally propose a new approach to secure this protocol based on AugPAKE algorithm and PRESENT encryption. This solution provides mutual authentication between the broker and their clients (publishers and subscribers), the confidentiality of the published message is protected twice, the integrity and non-repudiation of MQTT messages which is protected during the process of transmission.


2021 ◽  
Vol 2 (5) ◽  
pp. 1574-1581
Author(s):  
Musa F. Silaen ◽  
Sepbeariska Manurung ◽  
Christine D. Nainggolan

The purpose of this research is to analyze the effect of benefit perception, ease perception, security and risk perception of merchant interest in using Quick Response Indonesia Standard (QRIS) simultaneously or partially. The research variables consist of, X1 is benefit perception X2 is easy perception, X3 is security, X4 is risk perception and Y is merchant interest in using QRIS. Research data is Primary Data, obtained from the results of the distribution of questionnaires designed with the scale likert. The sample of the research was the merchant in pematangsiantar. Test Instruments using Test validity and reliability using SPSS. Technique Analysis, Multiple Regression, Classic Assumption Test, Hypothesis Test (Test F and Test t). The result showed that benefit perception has no significant effect on merchant interest using QRIS, the easy perception has no significant effect on merchant interest using QRIS, the security has significant effect on merchant interest using QRIS and the risk perception has significant effect on merchant interest using QRIS.


2021 ◽  
Vol 3 (2) ◽  
pp. 37-48
Author(s):  
Amitkumar ◽  
M. Ifran Sanni ◽  
Dwi Apriliasari

The application of technology in various aspects of life has made it easy for many people. However, there are also shortcomings in the use of technology, one of which is security issues, both transactions and data. Given these issues in this paper, we propose blockchain technology for an authentication system that will protect data rights and interests and be safe from interference to store information in the form of confidential text, especially in the application of technology in education. From this writing, there are 2 benefits, the first is that all data stored in the education system is guaranteed and there will be increased trust from both parents, teachers and other parties due to the decentralized nature of blockchain.


Sign in / Sign up

Export Citation Format

Share Document