lisensi ini mengizinkan setiap orang untuk menggubah ...kc.umn.ac.id/4821/3/daftar pustaka.pdf74...
TRANSCRIPT
Team project ©2017 Dony Pratidana S. Hum | Bima Agus Setyawan S. IIP
Hak cipta dan penggunaan kembali:
Lisensi ini mengizinkan setiap orang untuk menggubah, memperbaiki, dan membuat ciptaan turunan bukan untuk kepentingan komersial, selama anda mencantumkan nama penulis dan melisensikan ciptaan turunan dengan syarat yang serupa dengan ciptaan asli.
Copyright and reuse:
This license lets you remix, tweak, and build upon work non-commercially, as long as you credit the origin creator and license it on your new creations under the identical terms.
74
DAFTAR PUSTAKA
Afdhila, D., Nasution, S. M. dan Azmi, F., 2016. Implementation of Stream
Cipher Salsa20 Algorithm to Secure Voice on Push to Talk Application. Dalam
The 2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), hal.
137.
aptitudefordummies, 2014. Learn how to calculate a power b modulus n i.e a^b
mod n .. [online] Tersedia dalam:
https://aptitudefordummies.wordpress.com/2014/11/24/learn-how-to-calculate-a-
power-b-modulus-n-i-e-ab-mod-n/ [Diakses 13 Agustus 2017].
Bernstein, D. J., 2012. Salsa20/12. [online] Tersedia dalam:
http://www.ecrypt.eu.org/stream/e2-salsa20.html [Diakses 11 April 2017].
Bernstein, D. J., t.thn. The Salsa20 core. [online] Tersedia dalam:
https://cr.yp.to/salsa20.html [Diakses 2017 Juli 2017].
Chomsiri, T., 2008. Sniffing Packets on LAN without ARP Spoofing. Dalam
Third 2008 International Conference on Convergence and Hybrid Information
Technology, hal. 472.
Cisco, 2016. IP Telephony/Voice over IP (VoIP). [online] Tersedia dalam:
http://www.cisco.com/c/en/us/tech/voice/ip-telephony-voice-over-ip-
voip/index.html [Diakses 13 Maret 2017].
Fatoni, 2011. Analisis Kualitas Layanan jaringan Intranet (Studi Kasus
Universitas Bina Darma).
Goode, B., 2002. Voice Over Internet Protocol (VoIP). PROCEEDINGS OF THE
IEEE, 90, hal. 1495.
Grainger, B., 2008. Salsa20 Implementation in C#. [online] Tersedia dalam:
http://faithlife.codes/blog/2008/06/salsa20_implementation_in_c_1/
[Diakses Mei 2017].
Hartpence, B. 2013. Packet guide to Voice over IP. O'Reilly, Sebastopol, CA.
Hoven, v. d, dkk., 2014. Privacy and Information Technology (Stanford
Encyclopedia of Philosophy). [online] Tersedia dalam:
https://plato.stanford.edu/entries/it-privacy/ [Diakses 7 April 2017].
Irawan, P. L. T., Santjojo, D. D. H. dan Sarosa, M., 2014. Implementasi Kripto-
Steganografi Salsa20 dan BPCS untuk Pengamanan Data Citra Digital. [online]
Tersedia dalam:
Implementasi Algoritma Enkripsi..., Bodhi Jaya, FTI, 2017
75
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rj
a&uact=8&ved=0ahUKEwiH7_Og_JvTAhVIt48KHRY3Ah8QFggbMAA&url=h
ttp%3A%2F%2Fjurnaleeccis.ub.ac.id%2Findex.php%2Feeccis%2Farticle%2Fdo
wnload%2F258%2F228&usg=AFQjCNEMgkkz5hFA4ZnEv3MWv1RlhNHzBg
[Diakses 11 April 11].
Ireland, D., 2016. RSA Algorithm. [online] Tersedia dalam: http://www.di-
mgt.com.au/rsa_alg.html [Diakses 17 Maret 2017].
Keromytis, A. D., 2010. [online] Tersedia dalam:
http://www1.cs.columbia.edu/~angelos/Papers/2010/msp2010020076.pdf
[Diakses 31 Juli 2017].
Kleinjung, T., Aoki, K., Franke, J., Lenstra, A., Thomé, E., Bos, J., Gaudry, P.,
Kruppa, A., Montgomery, P., Osvik, D., Riele, H., Timofeev, A. and
Zimmermann, P. 2010. Factorization of a 768-bit RSA modulus. 1.4.
Kowalczyk, C., 2017. Salsa20 Symetric Cipher. [online] Tersedia dalam:
http://www.crypto-it.net/eng/symmetric/salsa20.html?tab=0 [Diakses 31 Juli
2017].
Maitra, S., Paul, G. dan Meier, W., 2005. https://eprint.iacr.org/2015/217.pdf.
[online] Tersedia dalam: https://eprint.iacr.org/2015/217.pdf [Diakses 17 Agustus
2017].
Meindl, J. D., 2003. Beyond Moore's Law : The Interconnect Era. Computing In
Science and Engineering, hal. 20.
microsoft.com, 2008. Introducing Visual Studio. [online] Tersedia dalam:
https://msdn.microsoft.com/en-us/library/fx6bk1f4(v=vs.90).aspx [Diakses 1
Agustus 2017].
Microsoft.com, 2017. What is a DLL?. [online] Tersedia dalam:
https://support.microsoft.com/en-us/help/815065/what-is-a-dll [Diakses 1 Agustus
2017].
Microsoft.com, 2017. Why Use C#. [online] Tersedia dalam:
https://msdn.microsoft.com/en-us/library/aa664274(v=vs.71).aspx [Diakses 1
Agustus 2017].
Microsoft, 2016. Advanced startup options (including safe mode). [online]
Tersedia dalam: https://support.microsoft.com/en-us/help/17419/windows-7-
advanced-startup-options-safe-mode [Diakses 31 Juli 2017].
Microsoft, 2017. RSA Class (System.Security.Cryptography). [online] Tersedia
dalam: https://msdn.microsoft.com/en-
Implementasi Algoritma Enkripsi..., Bodhi Jaya, FTI, 2017
76
us/library/system.security.cryptography.rsa(v=vs.110).aspx [Diakses 6 April
2017].
Mobilefish, 2017. Online RSA key generation. [online] Tersedia dalam:
http://www.mobilefish.com/services/rsa_key_generation/rsa_key_generation.php
[Diakses 16 Agustus 2017].
Nah, F. F.-H., 2003. A Study On Tolerable Waiting Time : How Long Are Web
Users Willing To Wait?. Dalam Americas Conference on Information Systems
(AMCIS), hal. 2212.
Net Industries, 2017. Wiretapping and Eavesdropping - The Impact Of Electronic
Surveillance On Personal Privacy, Early Restrictions On Electronic Surveillance,
The Contemporary Legal Status Of Wiretapping And Eavesdropping. [online]
Tersedia dalam: http://law.jrank.org/pages/2323/Wiretapping-Eavesdropping.html
[Diakses 31 Juli 2017].
Paar, C. & Pelzl, J., 2010. Understanding Cryptography A Textbook for Students
and Practitioners. Springer, Berlin.
Pfleeger, C. P. dan Pfleeger, S. L., 2009. Security in Computing. Edisi ke 4.
Prentice Hall.
Porter, dkk., 2006. Practical VoIP Security. Syngress Publishing Inc., Rockland.
Postel, J., 1980. User Datagram Protocol. [online] Tersedia dalam:
https://www.ietf.org/rfc/rfc768.txt [Diakses 30 Juli 2017].
Purbo, O. W., 2007. VoIP Cikal Bakal "Telkom Rakyat". Infokomputer, Jakarta.
Ridwan, M., Widhi Nugraha, A. W. & Susilawati, H., 2011. Uji kelayakan
Jaringan Lokal Universitas Jendral Soedirman Untuk Implementasi VoIP.
Universitas Jendral Soedirman, Purbalingga.
Schulzrinne, H., Casner, S. L., Frederick, R. & Jacobson, V., 2003. RTP: A
Transport Protocol for Real-Time Applications. [online] Tersedia dalam:
https://www.ietf.org/rfc/rfc3550.txt [Diakses 21 Juni 2013].
Shaidani, S., 2015. Attacks and Defences Against Voice over IP (VoIP). Tufts
University.
Sharma, H., 2007. A Voice Chat Application in C#. [online] Tersedia dalam:
https://www.codeproject.com/Articles/19485/A-Voice-Chat-Application-in-C
[Diakses 5 April 2017].
Stallings, W., 2011. Cryptography and Network Security Principles and Practice.
Edisi ke 5. Pearson.
Implementasi Algoritma Enkripsi..., Bodhi Jaya, FTI, 2017
77
Wijaya, S. A., 2007. Pengamanan jaringan VoIP Dengan Memanfaatkan
Algoritma Stream Chiper A5. [online] Tersedia dalam:
http://informatika.stei.itb.ac.id/~rinaldi.munir/Kriptografi/2007-
2008/Makalah2/MakalahIF5054-2007-B-048.pdf [Diakses 14 Agustus 2017].
Wulansari, D., A., Setyawan, F. A. & Susanto, H., 2016. Mengukur Kecepatan
Enkripsi dan Dekripsi Algoritma RSA pada Pengembangan Sistem Informasi Text
Security, Universitas Negeri Semarang, Semarang.
Yashaswini, 2015. Key Distribution for Symmetric Key Cryptography: A Review.
Dalam International Journal of Innovative Research in Computer and
Communication Engineering, 3(5), hal. 4327.
Implementasi Algoritma Enkripsi..., Bodhi Jaya, FTI, 2017