Caesar Firdaus, 2016
SISTEM MONITORING KONTRAK KERJASAMA DENGAN PROTOKOL TWO CENTRAL FACILITIES MENGGUNAKAN ALGORITMA AES DAN WHITESPACE MANIPULATION
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu
1
DAFTAR PUSTAKA
Adobe Systems Incorporated. (2005). Adobe PDF 101 - Quick Overview of PDF file format. Retrieved from Adobe:
http://partners.adobe.com/public/developer/tips/topic_tip31.html
Al Tamimi, A.-K. (2014). Performance Analysis of Data Encryption Algorithms.
Washington University in St. Louis.
Aura, T. (1996). Practical Invisibility in Digtal Communication. Lectures Note in Computer Science vol.1774, 265-278.
Bellare, M., & Rogaway, P. (2005). Introduction to Modern Cryptography. San Diego, California.
Dilip, K., Vinay, K., & Sahu, G. (2007). Digital Watermarking for Secure E-Government Framework. Computer Society of India, 182-191.
DuFeu, D., & Harris, J. (2001). Online Election System. 95.413 Project Report Carleton University.
Fabien, A., Peticolas, Ross, J., & Markus, G. (1999). Information Hiding - A Survey. Proceedings of IEEE, 1062-1078.
Fonteneau, C., Motsch, J., Babel, M., & D'eforges, O. (2008). A Hierarchical Selective Encryption Technique in A Scalable Image Codec.
Hsu, C., & Wu, J.-L. (1998). Multiresolution watermarking for digital images.
IEEE Trans. Circuit Syst. II, Vol 45, 1097-1101.
I-Shi, L., & Wen-Hsiang, T. (2009). A new approach to covert communication via PDF files. Science Direct, 557-565.
Jalil, Z. (2010). Copyright Protection of Plain Text Using Digital Watermarking.
Higher Education Commision, Pakistan.
Kurilova, D. (2013). Internet Security Protocols. Information Security and Privacy.
Munir, R. (2006). Kriptografi. Bandung: Informatika.
National Institute of Standards and Technology. (2012). Secure Hash Standards.
Caesar Firdaus, 2016
SISTEM MONITORING KONTRAK KERJASAMA DENGAN PROTOKOL TWO CENTRAL FACILITIES MENGGUNAKAN ALGORITMA AES DAN WHITESPACE MANIPULATION
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu
2
Ornaghi, A., & Valleri, M. (2003). Man in The Middle Attack Demos. Blackhat Conference. Retrieved from Blackhat.
Permadi, R. B. (2014). Sistem E-Voting menggunakan Protokol Two Central Facilities dengan Menggabungkan Algoritma AES dan RSA sebagai Kombinasi Keamanan. Universitas Pendidikan Indonesia.
Pressman, R. S. (2001). Software Engineering : A Practicioner's Approach 5th Edition. New York: McGraw-Hill.
Provos, N., & Honeyman, P. (2003). Hide and Seek: An Introduction to Steganography. IEEE.
Puech, W., J., R. M., Rodrigues, J. M., & Develay-Morice, J. E. (2005). A New Fast Reversible Method for Image Safe Transfer. 13th European Signal Processing Conference.
Rein, L., & Peterson, A. (2015, November 19). What you need to know about the hack of government background investigations. Retrieved from The Washington Post: https://www.washingtonpost.com/news/federal- eye/wp/2015/07/09/what-you-need-to-know-about-the-hack-of-government-background-investigations/
Schneier, B. (1996). Applied Cryptography - Protocols, Algorithms, and Source Code in C. New York: John Wiley and Sons, Inc.
Selent, D. (2010). Advanced Encryption Standard. InSight: RIVIER ACADEMIC JOURNAL, Volume 6, Number 2.
SELULAR.ID. (2015, Oktober 23). Apa Jadinya Bila Data BPJS Diretas Hacker. Retrieved from SELULAR.ID:
http://selular.id/news/security/2015/10/apa-jadinya-bila-data-bpjs-diretas-hacker/
Shangping, Z., Xueqi, C., & Tierui, C. (2007). Data Hiding in a Kind of PDF Text for Secret Communication. International Journal of Network Security, Vol.4, 17-26.
Sireesha , J., & Chakchai , S.-I. (2005 ). Secure Virtual Election Booth with Two Central Facilities . Department of Computer Science Washington
University in St. Louis, USA .
Caesar Firdaus, 2016
SISTEM MONITORING KONTRAK KERJASAMA DENGAN PROTOKOL TWO CENTRAL FACILITIES MENGGUNAKAN ALGORITMA AES DAN WHITESPACE MANIPULATION
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu
3
Takizawa, O., Matsumoto, T., Nakagawa, H., Murase, I., & Makino, K. (2005). Information Hiding on Digital Documents by Adjustment of New-line Posititions. National Institute of Information and Communications. The Guardian. (2015, September 23). US government hack stole fingerprints of
5.6 million federal employees. Retrieved from The Guardian: