Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide A Syalim, Y Hori, K Sakurai | 115 | 2009 |
Customer churn analysis and prediction using data mining models in banking industry KGM Karvana, S Yazid, A Syalim, P Mursanto 2019 international workshop on big data and information security (IWBIS), 33-38, 2019 | 49 | 2019 |
Preserving integrity and confidentiality of a directed acyclic graph model of provenance A Syalim, T Nishide, K Sakurai Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 …, 2010 | 44 | 2010 |
Realizing proxy re-encryption in the symmetric world A Syalim, T Nishide, K Sakurai Informatics Engineering and Information Science: International Conference …, 2011 | 41 | 2011 |
Grouping provenance information to improve efficiency of access control A Syalim, Y Hori, K Sakurai Advances in Information Security and Assurance: Third International …, 2009 | 20 | 2009 |
Improved proxy re-encryption scheme for symmetric key cryptography A Syalim, T Nishide, K Sakurai Big Data and Information Security (IWBIS), 2017 International Workshop on …, 2017 | 12* | 2017 |
Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider A Syalim, T Tabata, K Sakurai 情報処理学会論文誌 47 (2), 621-626, 2006 | 10 | 2006 |
Factors influencing e-tourism stickiness: A perspective of TripTrus. Com AC Prasetyo, B Purwandari, R Satria, I Solichah, S Yazid, A Syalim 2017 International Conference on Information Technology Systems and …, 2017 | 8 | 2017 |
Performance analysis of the symmetric proxy re-encryption scheme RP Meiliasari, A Syalim, S Yazid 2019 International Workshop on Big Data and Information Security (IWBIS), 91-96, 2019 | 3 | 2019 |
Securing provenance of distributed processes in an untrusted environment A Syalim, T Nishide, K Sakurai IEICE TRANSACTIONS on Information and Systems 95 (7), 1894-1907, 2012 | 3 | 2012 |
Controlling Access in Databases by Outsourcing Access Control to Trusted Third Parties A Syalim, T Tabata, K Sakurai | 2 | 2006 |
dHash-based Anti-Counterfeiting Scheme: Against Tag Re-application Attacks on Batik Tulis GN Tarempa, A Syalim 2021 International Seminar on Machine Learning, Optimization, and Data …, 2022 | 1 | 2022 |
How to sign multiple versions of digital documents A Syalim, K Sakurai 2017 International Workshop on Big Data and Information Security (IWBIS …, 2017 | 1 | 2017 |
FOREWORD Special Section on Next-generation Security Applications and Practice SH Shin, N Yanai, P Angın, Y Cao, D Choi, H Cho, JP Cruz, SH Heng, ... | | 2022 |
Aggregate Authentication for Massive Internet of Things in 5G Networks A Syalim, B Anggorojati, J Baek, D Gerbi, I You Mobile Internet Security: 4th International Symposium, MobiSec 2019 …, 2020 | | 2020 |
Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance A Syalim, T Nishide, K Sakurai Information and Communication Technology: International Conference, ICT …, 2013 | | 2013 |
D-031 Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance S Amril, N Takashi, S Kouichi 情報科学技術フォーラム講演論文集 9 (2), 161-162, 2010 | | 2010 |
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance S Amril, N Takashi, S Kouichi IEICE Conferences Archives, 2010 | | 2010 |
Securing Provenance by Distributing the Provenance Storage A Syalim, Y Hori, K Sakurai 研究報告コンピュータセキュリティ (CSEC) 2009 (20 (2009-CSEC-44)), 13-18, 2009 | | 2009 |
Author ’s Index A Gifari, A Uluwiyah, A Prasetio, AT Sangsoko, A Nurhadiyatna, ... | | |