Ari Moesriami Barmawi

Orcid: 0000-0001-8676-9977

According to our database1, Ari Moesriami Barmawi authored at least 21 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Improving ANiTW Performance Using Bigrams Character Encoding and Identity-Based Signature.
IEEE Access, 2023

Authentication Scheme Using Honey Sentences.
Proceedings of the Advances in Information and Communication, 2023

2022
Blockchain-based Smart Parking System using Ring Learning With Errors based Signature.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

Activity Attribute-Based User Behavior Model for Continuous User Authentication.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

2021
Improving the Imperceptibility of Pixel Value Difference and LSB Substitution Based Steganography Using Modulo Encoding.
Proceedings of the Intelligent Computing, 2021

Strengthening the Security of Deniable Authentication Scheme Using Zero-Knowledge Proof.
Proceedings of the ICCNS 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3, 2021

2020
Improving Data Hiding Capacity in Code Based Steganography using Multiple Embedding.
J. Inf. Hiding Multim. Signal Process., 2020

Improving the Performance of Blockchain Based Digital Contract Using Niederreiter Method.
Proceedings of the ITCC 2020: 2nd International Conference on Information Technology and Computer Communications, 2020

2019
Strengthening fawkescoin against double spending attack using merkle tree.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

2018
Permutation Modification of Reversible Data Hiding Using Difference Histogram Shifting in Encrypted Medical Image.
Proceedings of the Empowering Smart Technology in Digital Era for a Better Life: The 3rd International Conference on Computer Science and Computational Intelligence, 2018

2017
Information Hiding Based on Histogramand Pixel Pattern.
J. Cyber Secur. Mobil., 2017

Strengthening Dynamic Identity Based Remote User Authentication Scheme Using Smart Card against Offline Password Guessing Attack.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

2016
Increasing Secret Data Hiding Capacity in QR Code Using 3 \times 3 3 × 3 Subcells.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Improving NORMALS Using Modified Baudot-Murray Code.
Proceedings of the 6th International Conference on Communication and Network Security, 2016

Modified Graphstega Based on Chart Scale Modification.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2014
A Visual One-Time Password Authentication Scheme Using Mobile Devices.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

2012
Securing Elliptic Curve based El-Gamal against Pollard Rho attack using Elliptic Curve based Diffie-Hellman Key Exchange.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2000
Conference Key Agreement Protocol Using Oblivious Transfer.
Proceedings of the Data and Application Security, 2000

1999
Robust Protocol for Generating Shared RSA Parameters.
Proceedings of the Cryptography and Coding, 1999

Group Public Key Agreement Protocol.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999


  Loading...