Skip to main content

Showing 1–3 of 3 results for author: Ahmar, A S

Searching in archive cs. Search in all archives.
.
  1. arXiv:1901.11358  [pdf

    cs.HC

    Application of TAM model to the use of information technology

    Authors: Harryanto, Muchriana Muchran, Ansari Saleh Ahmar

    Abstract: The purpose of this research is to see the application of modified TAM model by entering the experiential variable as a moderation variable to see one's intention in the use of technology especially internet banking. Data obtained through the distribution of questionnaires to customers. The study population is bank customers registered as users of internet banking services. The sample selection us… ▽ More

    Submitted 13 January, 2019; originally announced January 2019.

    Journal ref: International Journal of Engineering & Technology (UAE), 7 (2.9) (2018) 37-40

  2. arXiv:1901.04081  [pdf

    cs.CR cs.NI

    Implementing DMZ in Improving Network Security of Web Testing in STMIK AKBA

    Authors: Akbar Iskandar, Elisabet Virma, Ansari Saleh Ahmar

    Abstract: The aims of this research are to design and to implement network security system in internal web testing using DeMilitarized Zone Method and Microtic Router on Siakad server of STMIK AKBA. Data analysis techniques that possible to use is descriptive method. The significances of the study are 1) to avoid the attack of cracker who intend to access the system without permissions and 2) to improve net… ▽ More

    Submitted 13 January, 2019; originally announced January 2019.

    Journal ref: International Journal of Engineering & Technology (UEA), 7 (2.3) (2018) 99-104

  3. Digital Signature Security in Data Communication

    Authors: Robbi Rahim, Andri Pranolo, Ronal Hadi, Rasyidah, Heri Nurdiyanto, Darmawan Napitupulu, Ansari Saleh Ahmar, Leon Andretti Abdillah, Dahlan Abdullah

    Abstract: Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack from irresponsible parties are using steganography, cryptography or also use digital signatures. Digital signatures could be one of solution wher… ▽ More

    Submitted 5 November, 2018; originally announced November 2018.

    Comments: 6 pages, Paper presented at the International Conference on Education and Technology (ICEduTech2017), Novotel Hotel, Balikpapan, Indonesia