Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Perfecting a Video Game with Game Metrics

Numerical Method for Evaluating E-Cash Security Dany Eka Saputra; Sarwono Sutikno; Suhono Harso Supangkat
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 6: December 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i6.9811

Abstract

Security evaluations of electronic cash (e-cash) schemes usually produce an abstract result in the form of a logical proof. This paper proposes a new method of security evaluation that produces a quantitative result. The evaluation is done by analyzing the protocol in the scheme using the Markov chain technique. This method calculates the probability of an attack that could be executed perfectly in the scheme’s protocol. As proof of the effectiveness of our evaluation method, we evaluated the security of Chaum’s untraceable electronic cash scheme. The result of our evaluation was compared to the evaluation result from the pi-calculus method. Both methods produced comparable results; and thus, both could be used as alternative methods for evaluating e-cash security.
Information Interchange Layer based on Classification of Information Use (IU) Albarda Albarda; Suhono Harso Supangkat; Kuspriyanto Kuspriyanto; Jaka Sembiring
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.70

Abstract

Information characteristics in classification of IU directly related to aspects of information usage by user in enterprise to accomplish their activities. Feature extraction from information usage in three layer of enterprise management used as parameter for this characteristic. Characteristics and dimension applied to develop middle-ware system (called Information Interchange Layer) that bridges a common issue ie information silo, to optimize a services of information resources in enterprise