Author:
Putro Prasetyo Adi Wibowo,Rionaldy Rizqy
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Fingerprint Password Method Provides Improved Accuracy over Token-based Authentication for Efficient and Secure File Transfers;E3S Web of Conferences;2024
2. Secure Chat Room Application Using AES-GCM Encryption and SHA-256;2023 15th International Conference on Innovations in Information Technology (IIT);2023-11-14
3. Rogue Access Point: The WLAN Threat;2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS);2022-11-04
4. Taxonomy and Future Threat of Rogue Access Point for Wireless Network;2022 9th International Conference on Computing for Sustainable Global Development (INDIACom);2022-03-23
5. Analysis of Pharmaceutical Company Websites using Innovation Diffusion Theory and Technology Acceptance Model;Advances in Science, Technology and Engineering Systems Journal;2021-01