S KOM 1100958 Bibilography

DAFTAR PUSTAKA
Adobe Systems Incorporated. (2005). Adobe PDF 101 - Quick Overview of PDF
file format. Retrieved from Adobe:
http://partners.adobe.com/public/developer/tips/topic_tip31.html
Al Tamimi, A.-K. (2014). Performance Analysis of Data Encryption Algorithms.
Washington University in St. Louis.
Aura, T. (1996). Practical Invisibility in Digtal Communication. Lectures Note in
Computer Science vol.1774, 265-278.
Bellare, M., & Rogaway, P. (2005). Introduction to Modern Cryptography. San
Diego, California.
Dilip, K., Vinay, K., & Sahu, G. (2007). Digital Watermarking for Secure EGovernment Framework. Computer Society of India , 182-191.
DuFeu, D., & Harris, J. (2001). Online Election System. 95.413 Project Report
Carleton University.
Fabien, A., Peticolas, Ross, J., & Markus, G. (1999). Information Hiding - A
Survey. Proceedings of IEEE, 1062-1078.
Fonteneau, C., Motsch, J., Babel, M., & D'eforges, O. (2008). A Hierarchical
Selective Encryption Technique in A Scalable Image Codec.
Hsu, C., & Wu, J.-L. (1998). Multiresolution watermarking for digital images.
IEEE Trans. Circuit Syst. II, Vol 45, 1097-1101.
I-Shi, L., & Wen-Hsiang, T. (2009). A new approach to covert communication via
PDF files. Science Direct, 557-565.

Jalil, Z. (2010). Copyright Protection of Plain Text Using Digital Watermarking.
Higher Education Commision, Pakistan.
Kurilova, D. (2013). Internet Security Protocols. Information Security and
Privacy.
Munir, R. (2006). Kriptografi. Bandung: Informatika.
National Institute of Standards and Technology. (2012). Secure Hash Standards.
Gaithersburg: Federal Information Processing Standards Publication.

Caesar Firdaus, 2016
SISTEM MONITORING KONTRAK KERJASAMA DENGAN PROTOKOL TWO CENTRAL FACILITIES
MENGGUNAKAN ALGORITMA AES DAN WHITESPACE MANIPULATION
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu

1

Ornaghi, A., & Valleri, M. (2003). Man in The Middle Attack Demos. Blackhat
Conference. Retrieved from Blackhat.
Permadi, R. B. (2014). Sistem E-Voting menggunakan Protokol Two Central
Facilities dengan Menggabungkan Algoritma AES dan RSA sebagai
Kombinasi Keamanan. Universitas Pendidikan Indonesia .

Pressman, R. S. (2001). Software Engineering : A Practicioner's Approach 5th
Edition. New York: McGraw-Hill.
Provos, N., & Honeyman, P. (2003). Hide and Seek: An Introduction to
Steganography. IEEE.
Puech, W., J., R. M., Rodrigues, J. M., & Develay-Morice, J. E. (2005). A New
Fast Reversible Method for Image Safe Transfer. 13th European Signal
Processing Conference.
Rein, L., & Peterson, A. (2015, November 19). What you need to know about the
hack of government background investigations. Retrieved from The
Washington Post: https://www.washingtonpost.com/news/federaleye/wp/2015/07/09/what-you-need-to-know-about-the-hack-ofgovernment-background-investigations/
Schneier, B. (1996). Applied Cryptography - Protocols, Algorithms, and Source
Code in C. New York: John Wiley and Sons, Inc.
Selent, D. (2010). Advanced Encryption Standard. InSight: RIVIER ACADEMIC
JOURNAL, Volume 6, Number 2.
SELULAR.ID. (2015, Oktober 23). Apa Jadinya Bila Data BPJS Diretas Hacker .
Retrieved from SELULAR.ID:
http://selular.id/news/security/2015/10/apa-jadinya-bila-data-bpjs-diretashacker/
Shangping, Z., Xueqi, C., & Tierui, C. (2007). Data Hiding in a Kind of PDF Text
for Secret Communication. International Journal of Network Security,
Vol.4, 17-26.

Sireesha , J., & Chakchai , S.-I. (2005 ). Secure Virtual Election Booth with Two
Central Facilities . Department of Computer Science Washington
University in St. Louis, USA .
Stallings, W. (2011). Cryptography and Network Security. New Jersey: Pearson
Education.
Caesar Firdaus, 2016
SISTEM MONITORING KONTRAK KERJASAMA DENGAN PROTOKOL TWO CENTRAL FACILITIES
MENGGUNAKAN ALGORITMA AES DAN WHITESPACE MANIPULATION
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu

2

Takizawa, O., Matsumoto, T., Nakagawa, H., Murase, I., & Makino, K. (2005).
Information Hiding on Digital Documents by Adjustment of New-line
Posititions. National Institute of Information and Communications.
The Guardian. (2015, September 23). US government hack stole fingerprints of
5.6 million federal employees. Retrieved from The Guardian:
http://www.theguardian.com/technology/2015/sep/23/us-governmenthack-stole-fingerprints

Caesar Firdaus, 2016

SISTEM MONITORING KONTRAK KERJASAMA DENGAN PROTOKOL TWO CENTRAL FACILITIES
MENGGUNAKAN ALGORITMA AES DAN WHITESPACE MANIPULATION
Universitas Pendidikan Indonesia | repository.upi.edu | perpustakaan.upi.edu

3