1. Man-in-the-middle-attack prevention using interlock protocol method;Rahim;ARPN J. Eng. Appl. Sci.,2017
2. Combination of the Blowfish and Lempel-Ziv-Welch algorithms for text compression;Rahim;World Trans. Eng. Technol. Educ.,2017
3. 3D object modeling using data fusion from laser sensor on quadrotor;Iswanto;in AIP Conference Proceedings,2016
4. Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm;Putera;Int. J. Secur. Its Appl.,2016
5. Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher;Rahim;Int. J. Sci. Res. Sci. Technol.,2016