PERANCANGAN APLIKASI PENGAMAN DOKUMEN DENGAN ALGORITMA XXTEA
Abstract
Full Text:
PDFReferences
Ariyus, D., 2008, Pengantar Ilmu Kriptografi Teori, Analisis, dan Implementasi, Penerbit Andi, Yogyakarta
Hariyanto, B., 2009, Sistem Operasi, Informatika, Bandung.
Jogiyanto, H.M., 2005, Analisis & Disain Sistem Informasi Pendekatan Terstruktur Teori Dan Praktek Aplikasi Bisnis, Edisi ke-2, Andi Offset, Yogyakarta.
Sianipar, R.H., 2014, Pemrograman Visual Basic.NET, Informatika, Bandung.
Stalling, W., 2003, Crypthography and Network Security, Prentice-hall inc, Amsterdam
Tanenbaum, A., 1990, Structured Computer Organization, Third edition, Prentice-hall inc, Amsterdam.
Wheeler, D. J. dan Needham, R. M., 1998, Correction To XTEA, Cambridge University, England
Zarlis, M. & Handrizal, 2008, Algoritma dan Pemrograman : Teori dan Praktik Dalam Pascal, Edisi Kedua,USU Press, Medan
DOI: https://doi.org/10.30743/but.v14i3.1270
Refbacks
- There are currently no refbacks.
Copyright (c) 2019 Haikal Nando Winata, Bahtera Kelana, Selly Annisa, Beni satria, Mery Sri Wahyuni, Zulkarnain Lubis, Abdullah Muhazzir
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Buletin Utama Teknik
Fakultas Teknik - Universitas Islam Sumatera Utara
Jl. Sisingamangaraja, Teladan, Medan 20217
Website: https://jurnal.uisu.ac.id/index.php/but
Email: bultek@ft.uisu.ac.id
Buletin Utama Teknik is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License