Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Ilham Arnomo
Authentication Comparison of Telecommunications Technology Using A3, A8, A5 and Rijndael Algorithms
Jurnal INFORM
Related publications
Wireless Mine-Wide Telecommunications Technology
Robust Authentication Scheme Between User and Remote Autonomous Object in Telecommunications System
IEICE Transactions on Information and Systems
Electronic Engineering
Pattern Recognition
Hardware
Computer Vision
Electrical
Architecture
Artificial Intelligence
Software
HDL Design and Verification of Hash Based Authentication Algorithms
International Journal for Research in Applied Science and Engineering Technology
Next Generation Electronic Passport Scheme Using Cryptographic Authentication Protocols and Multiple Biometrics Technology
International Journal of Information Engineering and Electronic Business
Analysis and Comparison Study of Data Mining Algorithms Using Rapid Miner
International Journal of Computer Science, Engineering and Applications
Authentication Schemes - Comparison and Effective Password Spaces
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
A5
A Comparison of Password Authentication Between Children and Adults
R&D Spillovers, Information Technology and Telecommunications, and Productivity in ASIA and the OECD
Information Economics and Policy
Management
Monitoring
Economics
Policy
Law
Econometrics