Jurnal Bisnis dan Manajemen, Vol. 5 No. 1, Mei 2005 (Rak 6-L : Ekonomi, Akuntansi dan Bisnis)
Jurnal Akuntansi dan Bisnis, Vol. 8, No.1 Februari 2008 (Rak 6-L: Ekonomi, Akuntansi, dan Bisnis)
Jurnal Bisnis dan Akuntansi, Vol. 9, No. 3, Desember 2007 (Rak 6-L: Ekonomi, Akuntansi, dan Bisnis)
Introduction: The Evolving Data–Driven Smart Sustainable Approach to Urbanism for Tackling the Challenges of Sustainability and Urbanization -- Smart Sustainable Urbanism and Big Data Computing: A Topical Literature Review -- Conceptual, Theoretical, and Disciplinary Foundations: An Interdisciplinary and Transdisciplinary Perspective -- The Data-Driven Smart Sustainable Paradigm of Urbanism: …
Invited Papers -- A Survey of Some Recent Results on Bent Functions -- A Survey of the Merit Factor Problem for Binary Sequences -- A Survey of Feedback with Carry Shift Registers -- Univariate and Multivariate Merit Factors -- Complexity of Sequences I -- Discrete Fourier Transform, Joint Linear Complexity and Generalized Joint Linear Complexity of Multisequences -- Expected Value of the Linea…
The Self-Star Vision -- The Self-Star Vision -- Self-organization -- Evolving Fractal Gene Regulatory Networks for Graceful Degradation of Software -- Evolutionary Computing and Autonomic Computing: Shared Problems, Shared Solutions? -- Self-? Topology Control in Wireless Multihop Ad Hoc Communication Networks -- Emergent Consensus in Decentralised Systems Using Collaborative Reinforcement Lear…
Snap-Stabilizing Optimal Binary Search Tree -- Synchronous vs. Asynchronous Unison -- A Snap-Stabilizing DFS with a Lower Space Requirement -- Self-stabilization of Byzantine Protocols -- Self-stabilization with r-Operators Revisited -- Self-stabilization Preserving Compiler -- Self-stabilizing Mobile Node Location Management and Message Routing -- Memory Management for Self-stabilizing Operati…
Stream Cipher Cryptanalysis -- An Improved Correlation Attack on A5/1 -- Extending the Resynchronization Attack -- A New Simple Technique to Attack Filter Generators and Related Ciphers -- Side-Channel Analysis -- On XTR and Side-Channel Analysis -- Provably Secure Masking of AES -- Block Cipher Design -- Perfect Diffusion Primitives for Block Ciphers -- Security of the MISTY Structure in the L…
Where Have All the Protocols Gone? -- A Protocol’s Life After Attacks... -- A Protocol’s Life After Attacks... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols --…
Invited Talk -- ECRYPT: The Cryptographic Research Challenges for the Next Decade -- Reduction of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions for Public-Key Encryption Schemes -- Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel -- Signature Schemes -- A Provably Secure Short Transitive Signature Scheme fr…