Analisis Dan Verifikasi Protokol Kriptografi Aplikasi Manajemen Kunci Menggunakan Scyther: Studi Kasus Aplikasi XYZ
Abstract
References
Barker. Elain, Miles Smid and Dennis Branstad. NIST Special Publication 800-152. A Profile for U.S. Federal Cryptographic Key Management Systems. National Institute of Standards and Technology. 2015.
Barker. Elain. NIST Special Publication 800-57 Revision 5. Rekomendation for Key Management Part-1 : General. National Institute of Standards and Technology. 2020.
M. Soriano, Information and Network Security 1st Edition, R. Gustau and S. Silvestre, Eds., Prague: Czech Technical University.
J. K. Shim, A. A. Qureshi and J. G. Siegel, The International Handbook of Computer Security, United States: The Glenlake Publishing Company, Ltd, 2000.
A. J. Menezes, S. A. Vanstone and P. C. Van Oorschot, Handbook of Applied Cryptography, United States: CRC Press, 1997.
M. Avalle, A. Pironti and R. Sisto, "Formal Verification of Security Protocol Implementations: a Survey," Form Asp Comp, vol. 26, pp. 99-123, 2014.
R. Chadha, V. Cheval, Ş. Ciobâcă and S. Kremer, "Automated Verification of Equivalence Properties of Cryptographic Protocols," ACM Transactions on Computational Logic, vol. 17, no. 4, p. Article 23, 2016.
Cremers, C., Mauw, S., Operational Semantics and Verification of Security Protocols, ISSN 1619-7100, Springer Berlin, Heidelberg, 2012, doi: https://doi.org/10.1007/978-3-540-78636-8.
El Madhoun, N., Bertin, E., Badra, M. et al. (2021). Towards more secure EMV purchase transactions. Ann. Telecommun. 76, 203–222, doi: https://remote-lib.ui.ac.id:2075/10.1007/s12243-020-00784-1
R. Amin, S. Kunal et al, "CFSec: Password based secure communication protocol in cloud-fog environment," Journal of Parallel and Distributed Computing, Volume 140, Pages 52-62, ISSN 0743-7315, 2020, doi: https://doi.org/10.1016/j.jpdc.2020.02.005.
A.K. Yadav, M. Misra, et al, "An improved and provably secure symmetric-key based 5G-AKA Protocol," Computer Networks, Volume 218, ISSN 1389-1286, 2022, doi: https://doi.org/10.1016/j.comnet.2022.109400.
M. Farokhlagha, S. Masoumeh, "SEOTP: A new secure and efficient ownership transfer protocol based on quadric residue and homomorphic encryption," Wireless Networks, 26(7), 5285-5306, 2022, doi:https://doi.org/10.1007/s11276-020-02397-x.
M. Bouchaala, C. Ghazel, L.A. Saidane, "Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card," J Supercomput 78, 497–522, 2022, doi:https://remote-lib.ui.ac.id:2075/10.1007/s11227-021-03857-7.
G. Darbandeh, M. Safkhani, "A New Lightweight User Authentication and Key Agreement Scheme for WSN," Wireless Pers Commun 114, 3247–3269, 2020, doi: https://remote-lib.ui.ac.id:2075/10.1007/s11277-020-07527-4.
Ahamad S. S., "A Novel NFC-Based Secure Protocol for Merchant Transactions," IEEE Access, vol. 10, pp. 1905-1920, 2022, doi: 10.1109/ACCESS.2021.3139065.
A. J. Menezes, S. A. Vanstone and P. C. Van Oorschot, Handbook of Applied Cryptography, United States: CRC Press, 1997.
Barker, Elaine, William Barker, William Burr, William Polk, & Miles Smid. Recommendation for Key Management – Part 1: General (Revision 4), NIST Special Publication 800-57, US Departement of Commerce. 2016.
Perancangan Basisdata" Online Shop Buku Dokter" Dengan Menggunakan My SQL SD Kurniawan, TK Jeriko Media Aplikom 9 (2), 98–120-98–120
PENGUKURAN KESENJANGAN DIGITAL DI BANYUMAS UNTUK MENGETAHUI KESIAPAN MASYARAKAT DALAM MEMANFAATKAN SMART CITY SD Kurniawan, AA Setyawan EDUSAINTEK 3
Analisis Keseimbangan Antara Kehidupan Dan Waktu Kerja Fleksibel Selama Pandemi Covid-19 Menggunakan SMART-PLS SD Kurniawan, M Huda JUPITER (Jurnal Penelitian Ilmu dan Teknik Komputer) 13 (2), 45-51
Perencanaan Dan Pembuatan Alat Penghitung Penggunaan Daya Dan Biaya Penggunaan Listrik Berbasis Atmega 16 SD Kurniawan Universitas AMIKOM Yogyakarta
Implementasi Algoritma K-Nearest Neighbor Dengan Metode Hue Saturation Value Untuk Pendeteksi Kematangan Buah Jambu SD Kurniawan, T Junaidi Smart Comp: Jurnalnya Orang Pintar Komputer 11 (3), 541-547
PENGUKURAN KESENJANGAN DIGITAL DI PROVINSI KALIMANTAN UTARA SD Kurniawan, WW Winarno, H Henderi Jurnal Penelitian dan Pengabdian Kepada Masyarakat UNSIQ 4 (1), 21-27
ANALISIS NILAI E-LEARNING BERDASARKAN FAKTOR PSIKOLOGI WARNA STUDI KASUS: E LEARNING STMIK AMIKOM YOGYAKARTA R Hidayat, SD Kurniawan, S Anas Seminar Nasional Informatika (SNIf) 1 (1), 189-195
DOI: https://doi.org/10.30591/smartcomp.v12i2.5293
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 4.0 International License.
SMART COMP INDEXED OR REGISTERED BY
![]() | ![]() | ![]() | ![]() |
![]() | ![]() | ![]() | ![]() |
![]() | ![]() | ![]() | ![]() |
![]() | ![]() | ![]() |
View My Stats
![]() |