2,233 research outputs found

    Implementasi Algoritma ECDH dan AES untuk Pengamanan Pesan SMS pada Telepon Seluler

    Full text link
    Saat ini SMS menjadi kebutuhan bagi pengguna telepon seluler untuk berkomunikasi dengan orang lain. Tetapi pengguna telepon seluler tidak menyadari bahwa pesan yang dikirim bisa disadap atau dirubah oleh pihak yang tidak diinginkan. Untuk itu dibutuhkan suatu sistem keamanan dalam melakukan pengiriman pesan SMS yaitu kriptografi. Dengan keterbatasan sumber daya pada telepon seluler, maka implementasi teknik kriptografi simetrik sangat cocok untuk memenuhi kebutuhan keamanan pesan SMS. Pada kriptografi simetrik terdapat suatu kunci simetrik untuk proses enkripsi dan dekripsi. Supaya pertukaran kunci simetrik aman pada jalur publik maka dibutuhkan suatu protokol untuk pertukaran kunci.Penelitian ini mengimplementasikan kriptografi simetrik AES untuk enkripsi dan dekripsi pesan sedangkan untuk pertukaran kunci menggunakan protokol Ecliptic Curve Diffie-Hellman(ECDH). Pada penelitian ini protokol ECDH digunakan untuk membuat kunci bersama (shared key) yang nantinya digunakan oleh algoritma AES untuk enkripsi dan dekripsi pesan. Berdasarkan pengujian sistem dapat dilihat bahwa sistem dapat berjalan dengan baik dan kedua algoritma dapat diimplementasikan untuk enkripsi SMS pada telepon seluler berbasis Android. Dalam penelitian ditemukan bahwa pesan menjadi bertambah panjang sebanyak n state dikalikan dengan 4/3 serta pesan dapat dijaga kerahasiaan dan otentikasinya

    Providing home-based care using text messaging

    Get PDF
    2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011), Singapore.The increasing miniaturization of mobile devices marks an important opportunity for the next generation health care delivery. Mobile health (mHealth), existing at the nexus of health and technology provides a singular opportunity to take health where it is needed the most. Having had nearly mainstream adoption, may explain why the developed world is in tandem with health-related Millennium Development Goals (MDGs). On the other hand, developing countries still lag behind in meeting the same health-related goals, yet they continue to report successful stories of mobile technology growth and adoption but no major usage of the same to deliver healthcare. This research sought to explore existing mHealth applications to establish their suitability for use in developing countries such as Kenya to provide home-based care. This was done by a survey of existing literature and mHealth models, and an architecture developed in light of local communication infrastructure and local mobile phone abilities. It was established that for developing countries to take advantage of this leapfrogging technology in health, they would have to take advantage of the Short Message Service (SMS) that is cheap and accessible to all. A relationship amongst mHealth stakeholders was considered as key to enhancing the adoption of mHealth in such countries.The increasing miniaturization of mobile devices marks an important opportunity for the next generation health care delivery. Mobile health (mHealth), existing at the nexus of health and technology provides a singular opportunity to take health where it is needed the most. Having had nearly mainstream adoption, may explain why the developed world is in tandem with health-related Millennium Development Goals (MDGs). On the other hand, developing countries still lag behind in meeting the same health-related goals, yet they continue to report successful stories of mobile technology growth and adoption but no major usage of the same to deliver healthcare. This research sought to explore existing mHealth applications to establish their suitability for use in developing countries such as Kenya to provide home-based care. This was done by a survey of existing literature and mHealth models, and an architecture developed in light of local communication infrastructure and local mobile phone abilities. It was established that for developing countries to take advantage of this leapfrogging technology in health, they would have to take advantage of the Short Message Service (SMS) that is cheap and accessible to all. A relationship amongst mHealth stakeholders was considered as key to enhancing the adoption of mHealth in such countries

    International Conference on Computer Science and Communication Engineering

    Get PDF
    UBT Annual International Conference is the 9th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make them be aware of the recent advancements in different research fields, and provide them with a unique forum to share their experiences. It is also the place to support the new academic staff for doing research and publish their work in international standard level. This conference consists of sub conferences in different fields like: Art and Digital Media Agriculture, Food Science and Technology Architecture and Spatial Planning Civil Engineering, Infrastructure and Environment Computer Science and Communication Engineering Dental Sciences Education and Development Energy Efficiency Engineering Integrated Design Information Systems and Security Journalism, Media and Communication Law Language and Culture Management, Business and Economics Modern Music, Digital Production and Management Medicine and Nursing Mechatronics, System Engineering and Robotics Pharmaceutical and Natural Sciences Political Science Psychology Sport, Health and Society Security Studies This conference is the major scientific event of the UBT. It is organizing annually and always in cooperation with the partner universities from the region and Europe. We have to thank all Authors, partners, sponsors and also the conference organizing team making this event a real international scientific event

    Unified messaging control platform

    Get PDF

    Unified messaging control platform

    Get PDF

    A review of cyber threats and defence approaches in emergency management

    Get PDF
    Emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery. Failure of these systems, whether accidental or because of malicious action, can have severe implications for emergency management. Accidental failures have been extensively documented in the past and significant effort has been put into the development and introduction of more resilient technologies. At the same time researchers have been raising concerns about the potential of cyber attacks to cause physical disasters or to maximise the impact of one by intentionally impeding the work of the emergency services. Here, we provide a review of current research on the cyber threats to communication, sensing, information management and vehicular technologies used in emergency management. We emphasise on open issues for research, which are the cyber threats that have the potential to affect emergency management severely and for which solutions have not yet been proposed in the literature
    • …
    corecore