DAFTAR PUSTAKA
Chehal, R., & Singh, K. (2012). Efficiency and Security of Data with symmetric Encryption Algorithms. International Journal of advanced research in Computer Science and Software Engineering , 472-475.
Giradkar, S.S, & Bhattacharya, A. (2015). Securing Compresses Video Streams Using RC4 Encryption Schme. proceedings of 2015 Global conference on Communication Technologies (GCCT 2015), 640-644.
Haupt, R L., & Haupt, S E. (2004). Practical Genetic Algorithm.
Junod, P. (1999). Cryptography Secure Pseodorandom Bits generation: The Blum Blum Shub Generator. August.
Menezez, A. J., Paul, C. V., & Scoot, A. V. (1996). Handbook of Applied Cyrptography. CRC Press: Boca Raton.
Mollin, R. A. (2005). The Guide to Secrecy from Ancient to Modern Times. Taylor & Francis Group is the Academic Division of T & F Informa plc.
Mousa, A., & Hamad, A. (Vol.3, No. 2, June 2006). Evaluation of the RC4 Algorithm for Data Encryption. Internasional Journal of Computer Science & Applicatios , 44-56.
Mulya, M. (2013). Perbandingan Kecepatan Algoritma Kriptografi Asimetris. Journa l Resear ch Computer Science & Application , Vol 2, 7-12.
Sadikin, R. (2012). Kr iptografi untuk keamanan jaringan. Yogyakarta: Andi.
Sanjaya, B. M., & Telnoni, A. P. (2015). Imp lementasi Blum-blum-shub dan Chaotic Function untuk modifikasi key generating pada AES. Jurna l Elektro Telekomunikasi Terapan , 154-165.
Schneier, B. (1996). Applied Cryptography. John Wiley and Sons Inc.
Sidorenko, A., & Schoenmakers, B. (2005). Concrete Security of the Blum-Shub Psedorandom Generator. 10th IMA Internasional Conference, Lecture Notes in Computer Science 3796 , 355-375.
Stinson, D. (1995). Cryptography: Theory and Practice. Florida: CRC Press,Inc. Weerasinghe, T. D. (2013). An Effective RC4 Stream Cipher. International
Conference on Industrial and Information Systems (ICIIS) , 69-74.
Xie, J., & Pan, X. (2010). An Improved RC4 Stream Cipher. International Conference on Computer Application and System Modeling (ICCASAM) , v7-156-159.
LAMPIRAN :
DAFTAR PUBLIKASI ILMIAH PENULIS
NO Judul Artikel Penulis
Publikasi (Seminar-Jurnal)
Tahun Tempat
1.
Peranan Proxy Dalam Keamanan Jaringan
Internet Chaeroen Niesa
Prosiding Seminar Nasional Literasi Informasi (SENARAI), 01 Desember. Hal :
169-171.
2014
UNIVERSITAS SUMATERA UTARA, Medan
2.
Perbandingan Sistem Operasi Android
Kitkat Dengan Android Lollipop
Chaeroen Niesa, Niti Ravika
Nasution
Prosiding Seminar Sehari
Pascasarjana Informatika, SENOPATI, 30
Oktober
2015
UNIVERSITAS SUMATERA UTARA, Medan
3.
Analisis Sistem Penyimpanan Data
Berbasis Cloud Computing Studi
Kasus Kanwil Kementerian Agama
Provinsi Sumatera Utara
Niti Ravika Nasution, Chaeroen Niesa
Prosiding Seminar Sehari
Pascasarjana Informatika, SENOPATI, 30
Oktober
2015
UNIVERSITAS SUMATERA UTARA, Medan
4.
The Role Of Cryptography Of Vigenere Cipher In Information Security
Chaeroen Niesa
PROCEEDING International Conference of
Computer, Environment, Social Science, Engineering and
Technology (ICEST), 23-25
Mei. Hal: 134-140
2016 MEDAN,
INDONESIA