Lisensi ini mengizinkan setiap orang untuk menggubah ...kc.umn.ac.id/4821/3/DAFTAR PUSTAKA.pdf74...

5
Team project ©2017 Dony Pratidana S. Hum | Bima Agus Setyawan S. IIP Hak cipta dan penggunaan kembali: Lisensi ini mengizinkan setiap orang untuk menggubah, memperbaiki, dan membuat ciptaan turunan bukan untuk kepentingan komersial, selama anda mencantumkan nama penulis dan melisensikan ciptaan turunan dengan syarat yang serupa dengan ciptaan asli. Copyright and reuse: This license lets you remix, tweak, and build upon work non-commercially, as long as you credit the origin creator and license it on your new creations under the identical terms.

Transcript of Lisensi ini mengizinkan setiap orang untuk menggubah ...kc.umn.ac.id/4821/3/DAFTAR PUSTAKA.pdf74...

Team project ©2017 Dony Pratidana S. Hum | Bima Agus Setyawan S. IIP 

 

 

 

 

 

Hak cipta dan penggunaan kembali:

Lisensi ini mengizinkan setiap orang untuk menggubah, memperbaiki, dan membuat ciptaan turunan bukan untuk kepentingan komersial, selama anda mencantumkan nama penulis dan melisensikan ciptaan turunan dengan syarat yang serupa dengan ciptaan asli.

Copyright and reuse:

This license lets you remix, tweak, and build upon work non-commercially, as long as you credit the origin creator and license it on your new creations under the identical terms.

74

DAFTAR PUSTAKA

Afdhila, D., Nasution, S. M. dan Azmi, F., 2016. Implementation of Stream

Cipher Salsa20 Algorithm to Secure Voice on Push to Talk Application. Dalam

The 2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), hal.

137.

aptitudefordummies, 2014. Learn how to calculate a power b modulus n i.e a^b

mod n .. [online] Tersedia dalam:

https://aptitudefordummies.wordpress.com/2014/11/24/learn-how-to-calculate-a-

power-b-modulus-n-i-e-ab-mod-n/ [Diakses 13 Agustus 2017].

Bernstein, D. J., 2012. Salsa20/12. [online] Tersedia dalam:

http://www.ecrypt.eu.org/stream/e2-salsa20.html [Diakses 11 April 2017].

Bernstein, D. J., t.thn. The Salsa20 core. [online] Tersedia dalam:

https://cr.yp.to/salsa20.html [Diakses 2017 Juli 2017].

Chomsiri, T., 2008. Sniffing Packets on LAN without ARP Spoofing. Dalam

Third 2008 International Conference on Convergence and Hybrid Information

Technology, hal. 472.

Cisco, 2016. IP Telephony/Voice over IP (VoIP). [online] Tersedia dalam:

http://www.cisco.com/c/en/us/tech/voice/ip-telephony-voice-over-ip-

voip/index.html [Diakses 13 Maret 2017].

Fatoni, 2011. Analisis Kualitas Layanan jaringan Intranet (Studi Kasus

Universitas Bina Darma).

Goode, B., 2002. Voice Over Internet Protocol (VoIP). PROCEEDINGS OF THE

IEEE, 90, hal. 1495.

Grainger, B., 2008. Salsa20 Implementation in C#. [online] Tersedia dalam:

http://faithlife.codes/blog/2008/06/salsa20_implementation_in_c_1/

[Diakses Mei 2017].

Hartpence, B. 2013. Packet guide to Voice over IP. O'Reilly, Sebastopol, CA.

Hoven, v. d, dkk., 2014. Privacy and Information Technology (Stanford

Encyclopedia of Philosophy). [online] Tersedia dalam:

https://plato.stanford.edu/entries/it-privacy/ [Diakses 7 April 2017].

Irawan, P. L. T., Santjojo, D. D. H. dan Sarosa, M., 2014. Implementasi Kripto-

Steganografi Salsa20 dan BPCS untuk Pengamanan Data Citra Digital. [online]

Tersedia dalam:

Implementasi Algoritma Enkripsi..., Bodhi Jaya, FTI, 2017

75

https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rj

a&uact=8&ved=0ahUKEwiH7_Og_JvTAhVIt48KHRY3Ah8QFggbMAA&url=h

ttp%3A%2F%2Fjurnaleeccis.ub.ac.id%2Findex.php%2Feeccis%2Farticle%2Fdo

wnload%2F258%2F228&usg=AFQjCNEMgkkz5hFA4ZnEv3MWv1RlhNHzBg

[Diakses 11 April 11].

Ireland, D., 2016. RSA Algorithm. [online] Tersedia dalam: http://www.di-

mgt.com.au/rsa_alg.html [Diakses 17 Maret 2017].

Keromytis, A. D., 2010. [online] Tersedia dalam:

http://www1.cs.columbia.edu/~angelos/Papers/2010/msp2010020076.pdf

[Diakses 31 Juli 2017].

Kleinjung, T., Aoki, K., Franke, J., Lenstra, A., Thomé, E., Bos, J., Gaudry, P.,

Kruppa, A., Montgomery, P., Osvik, D., Riele, H., Timofeev, A. and

Zimmermann, P. 2010. Factorization of a 768-bit RSA modulus. 1.4.

Kowalczyk, C., 2017. Salsa20 Symetric Cipher. [online] Tersedia dalam:

http://www.crypto-it.net/eng/symmetric/salsa20.html?tab=0 [Diakses 31 Juli

2017].

Maitra, S., Paul, G. dan Meier, W., 2005. https://eprint.iacr.org/2015/217.pdf.

[online] Tersedia dalam: https://eprint.iacr.org/2015/217.pdf [Diakses 17 Agustus

2017].

Meindl, J. D., 2003. Beyond Moore's Law : The Interconnect Era. Computing In

Science and Engineering, hal. 20.

microsoft.com, 2008. Introducing Visual Studio. [online] Tersedia dalam:

https://msdn.microsoft.com/en-us/library/fx6bk1f4(v=vs.90).aspx [Diakses 1

Agustus 2017].

Microsoft.com, 2017. What is a DLL?. [online] Tersedia dalam:

https://support.microsoft.com/en-us/help/815065/what-is-a-dll [Diakses 1 Agustus

2017].

Microsoft.com, 2017. Why Use C#. [online] Tersedia dalam:

https://msdn.microsoft.com/en-us/library/aa664274(v=vs.71).aspx [Diakses 1

Agustus 2017].

Microsoft, 2016. Advanced startup options (including safe mode). [online]

Tersedia dalam: https://support.microsoft.com/en-us/help/17419/windows-7-

advanced-startup-options-safe-mode [Diakses 31 Juli 2017].

Microsoft, 2017. RSA Class (System.Security.Cryptography). [online] Tersedia

dalam: https://msdn.microsoft.com/en-

Implementasi Algoritma Enkripsi..., Bodhi Jaya, FTI, 2017

76

us/library/system.security.cryptography.rsa(v=vs.110).aspx [Diakses 6 April

2017].

Mobilefish, 2017. Online RSA key generation. [online] Tersedia dalam:

http://www.mobilefish.com/services/rsa_key_generation/rsa_key_generation.php

[Diakses 16 Agustus 2017].

Nah, F. F.-H., 2003. A Study On Tolerable Waiting Time : How Long Are Web

Users Willing To Wait?. Dalam Americas Conference on Information Systems

(AMCIS), hal. 2212.

Net Industries, 2017. Wiretapping and Eavesdropping - The Impact Of Electronic

Surveillance On Personal Privacy, Early Restrictions On Electronic Surveillance,

The Contemporary Legal Status Of Wiretapping And Eavesdropping. [online]

Tersedia dalam: http://law.jrank.org/pages/2323/Wiretapping-Eavesdropping.html

[Diakses 31 Juli 2017].

Paar, C. & Pelzl, J., 2010. Understanding Cryptography A Textbook for Students

and Practitioners. Springer, Berlin.

Pfleeger, C. P. dan Pfleeger, S. L., 2009. Security in Computing. Edisi ke 4.

Prentice Hall.

Porter, dkk., 2006. Practical VoIP Security. Syngress Publishing Inc., Rockland.

Postel, J., 1980. User Datagram Protocol. [online] Tersedia dalam:

https://www.ietf.org/rfc/rfc768.txt [Diakses 30 Juli 2017].

Purbo, O. W., 2007. VoIP Cikal Bakal "Telkom Rakyat". Infokomputer, Jakarta.

Ridwan, M., Widhi Nugraha, A. W. & Susilawati, H., 2011. Uji kelayakan

Jaringan Lokal Universitas Jendral Soedirman Untuk Implementasi VoIP.

Universitas Jendral Soedirman, Purbalingga.

Schulzrinne, H., Casner, S. L., Frederick, R. & Jacobson, V., 2003. RTP: A

Transport Protocol for Real-Time Applications. [online] Tersedia dalam:

https://www.ietf.org/rfc/rfc3550.txt [Diakses 21 Juni 2013].

Shaidani, S., 2015. Attacks and Defences Against Voice over IP (VoIP). Tufts

University.

Sharma, H., 2007. A Voice Chat Application in C#. [online] Tersedia dalam:

https://www.codeproject.com/Articles/19485/A-Voice-Chat-Application-in-C

[Diakses 5 April 2017].

Stallings, W., 2011. Cryptography and Network Security Principles and Practice.

Edisi ke 5. Pearson.

Implementasi Algoritma Enkripsi..., Bodhi Jaya, FTI, 2017

77

Wijaya, S. A., 2007. Pengamanan jaringan VoIP Dengan Memanfaatkan

Algoritma Stream Chiper A5. [online] Tersedia dalam:

http://informatika.stei.itb.ac.id/~rinaldi.munir/Kriptografi/2007-

2008/Makalah2/MakalahIF5054-2007-B-048.pdf [Diakses 14 Agustus 2017].

Wulansari, D., A., Setyawan, F. A. & Susanto, H., 2016. Mengukur Kecepatan

Enkripsi dan Dekripsi Algoritma RSA pada Pengembangan Sistem Informasi Text

Security, Universitas Negeri Semarang, Semarang.

Yashaswini, 2015. Key Distribution for Symmetric Key Cryptography: A Review.

Dalam International Journal of Innovative Research in Computer and

Communication Engineering, 3(5), hal. 4327.

Implementasi Algoritma Enkripsi..., Bodhi Jaya, FTI, 2017