[HTML][HTML] Integrity authentication based on blockchain and perceptual hash for remote-sensing imagery

D Xu, N Ren, C Zhu - Remote Sensing, 2023 - mdpi.com
The integrity of remote-sensing image data is susceptible to corruption during storage and
transmission. Perceptual hashing is a non-destructive data integrity-protection technique …

Does green supply chain integration contribute towards sustainable performance?

A Setyadi - Uncertain Supply Chain Management, 2019 - m.growingscience.com
Turning the attention towards a net performance of the Indonesian oil and gas industry is
important. Inconsistent performance of the oil and gas industry has shown the negative …

Quality of service for traffic monitoring system based on static routing using EoIP tunnel over IPSec

I Nurhaida, Ngadiyono - Proceedings of the 2019 Asia Pacific …, 2019 - dl.acm.org
The development of internet networks requires a network administrator to implement various
topology schemes on the location of the different network. It is intended to make each other …

Security risk analysis of bring your own device system in manufacturing company at Tangerang

A Retnowardhani, RH Diputra… - … Electronics and Control), 2019 - telkomnika.uad.ac.id
Nowadays information system has become popular used for help effectiveness and
efficiency operation on a company. Bring Your Own Device (BYOD) system is a growing …

BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks

A Papathanasiou, G Liontos, G Paparis, V Liagkou… - Sensors, 2024 - mdpi.com
In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive
information from cyberattacks such as business email compromise (BEC) attacks has …

[PDF][PDF] Performance Comparison based on Open Shortest Path First (OSPF) Routing Algorithm for IP Internet Networks

I Nurhaida, D Ramayanti, I Nur - Commun. Appl. Electron, 2019 - caeaccess.org
Due to the rapid development of technology, the higher demands of internet network users
who want a form of network that can provide maximum results are increasing. In this case …

A Novel Two-Factor Authentication Scheme for Increased Security in Accessing the Moodle E-Learning Platform

V Baneş, C Ravariu, B Appasani, A Srinivasulu - Applied Sciences, 2023 - mdpi.com
Moodle is a platform designed for universal learning to support pedagogical interactions and
educational activities. The information technology (IT) administrator uses standard …

Penerapan Aplikasi Location Based Service Dalam Penangganan Gangguan Jaringan Berbasis Mobile

DAH Capah, T Herdi - Journal of Information Systems and Informatics, 2021 - journal-isi.org
Abstrak Location Based Service adalah kemampuan untuk mencari lokasi geografis dari
mobile device dan menyediakan layanan berdasarkan lokasi yang diperolehnya …

Security Evaluation of Different Hashing Functions with RSA for Digital Signature

M Badawy - IJCI. International Journal of Computers and …, 2023 - journals.ekb.eg
The emergence of the Internet of Things (IoT) represents a significant trend, where
integrating IP, data, and wireless technologies onto a single network yields substantial …

[PDF][PDF] INTERIOR GATEWAY PROTOCOL ROUTING PERFORMANCE COMPARISON OF THE VIRTUAL PRIVATE NETWORK BASED ON MULTI PROTOCOL LABEL …

I Nurhaida, DWP Pratama, RAM Zen, H Wei - Sinergi, 2020 - academia.edu
The stability and convergence time become an essential factor in network availability
performance. Multiprotocol Label Switching (MPLS) is one of the Virtual Private Network …