Studi Analisis Skema IBE-ECC pada Komunikasi Data Mobile Application

Main Article Content

Salim 'Imaduddiyan

Abstract

Environmental science is one of the new fields of science. This science was born in response to changing environmental conditions that are increasingly concerning. Environmental science has been studied in various colleges in different parts of the world. As a new science, environmental science has different positions in universities with various statuses ranging from courses, majors, study programs, departments, faculties to schools. Studying environmental science will also be closely related to the concept of sustainable development. But this all needs to be explored and studied more deeply about its development and role. The purpose and objective of this study is to know, describe and analyze the development and role of environmental science through higher education and its contribution in developing the concept of sustainable development, especially in Indonesia. The method used in this research is through a desk study. The results of temporary research show that environmental science has developed along with and in accordance with global environmental conditions. Universities both in the world and in Indonesia have taught environmental science, even becoming one of the sciences that are in demand and developing today.  In addition, environmental science has an important role in contributing its thoughts to Indonesia and the world and to achieve sustainable development

Article Details

How to Cite
’Imaduddiyan, S. (2023). Studi Analisis Skema IBE-ECC pada Komunikasi Data Mobile Application. Journal on Education, 5(3), 5608-5615. https://doi.org/10.31004/joe.v5i3.1317
Section
Articles

References

N. H. Kamarudin, Y. M. Yussoff and H. Hashim, "IBE_TRUST authentication for e-Health mobile monitoring system," 2015 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), Langkawi, 2015, pp. 160-164.
Bos J.W., Halderman J.A., Heninger N., Moore J., Naehrig M., Wustrow E. “Elliptic curve Cryptography in Practice”. In: Christin N., Safavi-Naini R. (eds) Financial Cryptography and Data Security. FC 2014. Lecture Notes in Computer Science, vol 8437. Springer, Berlin, Heidelberg, 2014.
R. Balamurugan, V. Kamalakannan, G. D. Rahul and S. Tamilselvan, "Enhancing security in text messages using matrix based mapping and ElGamal method in elliptic curve cryptography," 2014 International Conference on Contemporary Computing and Informatics (IC3I), Mysore, 2014, pp. 103-106.
T. Tam, M. Mozumbar, H. Yeh, and C. Tsang, “IDENTITY-BASED ENCRYPTION ON RESOURCE CONSTRAINED
EMBEDDED SYSTEM” ProQuest, University of Hong Kong, Hongkong, December 2014.
C. Paar, and J. Pelzl, “Understanding Cryptography” in Chapter 9 – Elliptic curve Cryptography, pp 239-257, Springer-Verlag Berlin Heidelberg, 2010
Boneh D., Franklin M. “Identity-Based Encryption from the Weil Pairing” In: Kilian J. (eds) Advances in Cryptology — CRYPTO 2001. CRYPTO 2001. Lecture Notes in Computer Science, vol 2139. Springer, Berlin, Heidelberg, 2001.
W. Chen, "An IBE-based security scheme on Internet of Things," 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, Hangzhou, 2012, pp. 1046-1049.
Tan SY., Heng SH., Goi BM. (2010) Java Implementation for Pairing-Based Cryptosystems. In: Taniar D., Gervasi O., Murgante B., Pardede E., Apduhan B.O. (eds) Computational Science and Its Applications – ICCSA 2010. ICCSA 2010. Lecture Notes in Computer Science, vol 6019. Springer, Berlin, Heidelberg
B. S. Adiga, M. A. Rajan, R. Shastry, V. L. Shivraj and P. Balamuralidhar, "Lightweight IBE scheme for Wireless Sensor nodes," 2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Kattankulathur, 2013, pp. 1-6.
C. C. Tan, H. Wang, S. Zhong and Q. Li, "IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks," in IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 6, pp. 926-932, Nov. 2009.
A. De Caro and V. Iovino, "jPBC: Java pairing based cryptography," 2011 IEEE Symposium on Computers and Communications (ISCC), Kerkyra, 2011, pp. 850-855.
Cisco. “Global Mobile Data Traffic Forecast Update, 2016–2021”. Retrieved from Cisco: http://www.cisco.com/c/en/us/solutions/collateral/ service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.html, February2017
NIST. (1999). Retrieved from National Institute of Standards and Technology: src.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf
ABIresearch. (2017, July 29). BYOD and Increased Malware Threats Help Driving Billion Dollar Mobile Security Services Market in 2013. Retrieved from ABIresearch: https://www.abiresearch.com/press/byod-and-increased-malware-threats-help-driving-bi/
eMarketer. (2017, July 29). US Mobile payments to Top $1 Billion in 2013. Retrieved from eMarketer: https://www.emarketer.com/Article/US-Mobile-Payments-Top-1-Billion-2013/1010035
Trevor Maynard PhD. (2017). Emerging Risks Report 2017 Counting the cost Cyber exposure decoded. London: Cyence.