Calculated based on number of publications stored in Pure and citations from Scopus
20092022

Research activity per year

Filter
Conference contribution

Search results

  • 2022

    dHash-based Anti-Counterfeiting Scheme: Against Tag Re-application Attacks on Batik Tulis

    Tarempa, G. N. & Syalim, A., 29 Mar 2022, 2021 International Seminar on Machine Learning, Optimization, and Data Science, ISMODE 2021. Institute of Electrical and Electronics Engineers Inc., p. 63-68 6 p. (2021 International Seminar on Machine Learning, Optimization, and Data Science, ISMODE 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • 2020

    Aggregate Authentication for Massive Internet of Things in 5G Networks

    Syalim, A., Anggorojati, B., Baek, J., Gerbi, D. & You, I., 2020, Mobile Internet Security - 4th International Symposium, MobiSec 2019, Revised Selected Papers. You, I., Chen, H.-C., Leu, F.-Y. & Kotenko, I. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-12 10 p. (Communications in Computer and Information Science; vol. 1121).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2019

    Customer Churn Analysis and Prediction Using Data Mining Models in Banking Industry

    Karvana, K. G. M., Yazid, S., Syalim, A. & Mursanto, P., Oct 2019, 2019 International Workshop on Big Data and Information Security, IWBIS 2019. Institute of Electrical and Electronics Engineers Inc., p. 33-38 6 p. 8935884. (2019 International Workshop on Big Data and Information Security, IWBIS 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    37 Citations (Scopus)
  • Performance Analysis of the Symmetric Proxy Re-encryption Scheme

    Meiliasari, R. P., Syalim, A. & Yazid, S., Oct 2019, 2019 International Workshop on Big Data and Information Security, IWBIS 2019. Institute of Electrical and Electronics Engineers Inc., p. 91-96 6 p. 8935670. (2019 International Workshop on Big Data and Information Security, IWBIS 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • 2018

    Factors influencing e-tourism stickiness: A perspective of TripTrus.Com

    Prasetyo, A. C., Purwandari, B., Satria, R., Solichah, I., Yazid, S. & Syalim, A., 23 Jan 2018, 2017 International Conference on Information Technology Systems and Innovation, ICITSI 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 325-331 7 p. (2017 International Conference on Information Technology Systems and Innovation, ICITSI 2017 - Proceedings; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)
  • 2017

    How to sign multiple versions of digital documents

    Syalim, A. & Sakurai, K., 2 Jul 2017, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 133-136 4 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Improved proxy re-encryption scheme for symmetric key cryptography

    Syalim, A., Nishide, T. & Sakurai, K., 2 Jul 2017, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 105-111 7 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Citations (Scopus)
  • 2013

    Supporting secure provenance update by keeping "provenance" of the provenance

    Syalim, A., Nishide, T. & Sakurai, K., 2013, Information and Communication Technology - International Conference, ICT-EurAsia 2013, Proceedings. p. 363-372 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7804 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2011

    Realizing proxy re-encryption in the symmetric world

    Syalim, A., Nishide, T. & Sakurai, K., 2011, Informatics Engineering and Information Science - International Conference, ICIEIS 2011, Proceeding. PART 1 ed. p. 259-274 16 p. (Communications in Computer and Information Science; vol. 251 CCIS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    25 Citations (Scopus)
  • 2010

    Preserving integrity and confidentiality of a directed acyclic graph model of provenance

    Syalim, A., Nishide, T. & Sakurai, K., 2010, Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Proceedings. p. 311-318 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6166 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Citations (Scopus)
  • 2009

    Comparison of risk analysis methods: Mehari, magerit, NIST800-30 and microsoft's security management guide

    Syalim, A., Hori, Y. & Sakurai, K., 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 726-731 6 p. 5066554. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    39 Citations (Scopus)
  • Grouping provenance information to improve efficiency of access Control

    Syalim, A., Hori, Y. & Sakurai, K., 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 51-59 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Citations (Scopus)