The development of education at this time the increasing number of campuses are growing. Therefore every university wants to gain a lot of students in promoting the university. Many …
AH Lubis, A Ikhwan, PLE Kan - International Journal of Engineering …, 2018 - academia.edu
Rabin Karp algorithm is a search algorithm that searches for a substring pattern in a text using hashing. It is beneficial for matching words with many patterns. One of the practical …
R Rahim - ARPN J. Eng. Appl. Sci, 2017 - researchgate.net
In the process of data communications, although data has been encrypted, there is the possibility of such data can be known by others. One possibility is that the person intercepts …
R Rahim, H Nurdiyanto, A Saleh A… - Journal of Physics …, 2018 - iopscience.iop.org
The development of technology is very fast, especially in the field of Internet technology that at any time experiencing significant changes, The development also supported by the ability …
The steganography process combines mathematics and computer science. Steganography consists of a set of methods and techniques to embed the data into another media so that …
Delivery of secure information and small size becomes a necessity in a communication within the network, to accommodate it needs to be cryptographic process which in this …
Simple negligence can be a fatal impact. The threat of cyber in 2017 is feeble, and it starts from “wanna cry” until “nopetya” that the impact is relatively weak. The public also feels the …
Z Qowi, N Hudallah - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
There is a risk in the process of exchanging information, especially text information. To reduce that risk, one of cryptographic method can be applied. That is Vigenere Cipher …
The security and confidentiality of information becomes an important factor in communication, the use of cryptography can be a powerful way of securing the information …