Follow
Amril Syalim
Amril Syalim
Faculty of Computer Science, Universitas Indonesia
Verified email at cs.ui.ac.id
Title
Cited by
Cited by
Year
Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide
A Syalim, Y Hori, K Sakurai
1222009
Customer churn analysis and prediction using data mining models in banking industry
KGM Karvana, S Yazid, A Syalim, P Mursanto
2019 international workshop on big data and information security (IWBIS), 33-38, 2019
552019
Preserving integrity and confidentiality of a directed acyclic graph model of provenance
A Syalim, T Nishide, K Sakurai
Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 …, 2010
442010
Realizing proxy re-encryption in the symmetric world
A Syalim, T Nishide, K Sakurai
Informatics Engineering and Information Science: International Conference …, 2011
412011
Grouping provenance information to improve efficiency of access control
A Syalim, Y Hori, K Sakurai
Advances in Information Security and Assurance: Third International …, 2009
202009
Improved proxy re-encryption scheme for symmetric key cryptography
A Syalim, T Nishide, K Sakurai
Big Data and Information Security (IWBIS), 2017 International Workshop on …, 2017
13*2017
Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider
A Syalim, T Tabata, K Sakurai
情報処理学会論文誌 47 (2), 621-626, 2006
102006
Factors influencing e-tourism stickiness: A perspective of TripTrus. Com
AC Prasetyo, B Purwandari, R Satria, I Solichah, S Yazid, A Syalim
2017 International Conference on Information Technology Systems and …, 2017
82017
Performance analysis of the symmetric proxy re-encryption scheme
RP Meiliasari, A Syalim, S Yazid
2019 International Workshop on Big Data and Information Security (IWBIS), 91-96, 2019
32019
Securing provenance of distributed processes in an untrusted environment
A Syalim, T Nishide, K Sakurai
IEICE TRANSACTIONS on Information and Systems 95 (7), 1894-1907, 2012
32012
DHash-based anti-counterfeiting scheme: Against tag re-application attacks on batik tulis
GN Tarempa, A Syalim
2021 International Seminar on Machine Learning, Optimization, and Data …, 2022
22022
Controlling Access in Databases by Outsourcing Access Control to Trusted Third Parties
A Syalim, T Tabata, K Sakurai
The Symposium on Cryptography and Information Security, 2006
22006
How to sign multiple versions of digital documents
A Syalim, K Sakurai
2017 International Workshop on Big Data and Information Security (IWBIS …, 2017
12017
Preserving integrity and confidentiality of a directed acyclic graph model of provenance
S Amril, N Takashi, S Kouichi
IEICE Conferences Archives, 2010
12010
FOREWORD Special Section on Next-generation Security Applications and Practice
SH Shin, N Yanai, P Angın, Y Cao, D Choi, H Cho, JP Cruz, SH Heng, ...
2022
Aggregate Authentication for Massive Internet of Things in 5G Networks
A Syalim, B Anggorojati, J Baek, D Gerbi, I You
Mobile Internet Security: 4th International Symposium, MobiSec 2019 …, 2020
2020
Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance
A Syalim, T Nishide, K Sakurai
Information and Communication Technology: International Conference, ICT …, 2013
2013
D-031 Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
S Amril, N Takashi, S Kouichi
情報科学技術フォーラム講演論文集 9 (2), 161-162, 2010
2010
Securing Provenance by Distributing the Provenance Storage
A Syalim, Y Hori, K Sakurai
研究報告コンピュータセキュリティ (CSEC) 2009 (20 (2009-CSEC-44)), 13-18, 2009
2009
Author ’s Index
A Gifari, A Uluwiyah, A Prasetio, AT Sangsoko, A Nurhadiyatna, ...
The system can't perform the operation now. Try again later.
Articles 1–20