×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of idsecconf
Undetectable Backdoor: The Art of Malicious Software and Social Engineering - Faizal Achmad
416 views
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhartono
146 views
Stolen e-money in 60sec - Tri Sumarno
228 views
Dfox - A Day To ShutDown Indonesian Internet Core Routing
271 views
Code review and security audit in private cloud - Arief Karfianto
369 views
BelagaBego - CROUCHING NETBOOK HIDDEN BACKTRACK: "wireless Man-in-the middle with 3G Touchsreen EEEPC
1.455 views
Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru
160 views
Herpiko Dwi Aguno - PKIWebSDK : Pustaka JavaScript untuk aplikasi PKI berbasis HTML5
157 views
Agung Nugraha - “Layanan Certification Authority (CA), Document Signing and Verification berbasis Web Service”
191 views
Studi dan implementasi keamanan user privacy menggunakan cp abe
405 views
Rat malware android with raspberry pi server
691 views
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Aplikasi Pesan Instan”
146 views
Riko Rahmada - Sertifikat dan Tanda Tangan Digital Indonesia
416 views
Pendekatan secure by design pada cluster resource allocation untuk pusat data
1.409 views
Danang Jaya, Query Adika Rezylana - Steganografi DCT dengan Memanfaatkan Aplikasi Pesan Instan
99 views
Charles Lim, Mario Marcello - “Sistem Pemantauan Ancaman Serangan Siber di Indonesia Generasi Baru”
101 views
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
412 views
Herpiko Dwi Aguno - “PKIWebSDK : Pustaka JavaScript untuk aplikasi PKI berbasis HTML5”
601 views
Agung Nugraha - Layanan CA, Document Signing and Verification berbasis web service
98 views
LockPicking (paper) - Mr.pick
1.700 views
< Prev
Next >