Pengaruh Penggunaan Jaringan Wifi dan 3G Pada Aplikasi Telepon Anti Sadap
Main Article Content
Abstract
jaringan wifi-wifi memiliki delay 0,003391 seconds dan troughput sebesar 126,173 kbps sehingga aplikasi telepon anti sadap dapat berjalan dengan baik apabila konektivitas jaringan yang digunakan adalah jaringan Wifi.
Kata kunci: android, enkripsi, tiny encryption algorithm, voice over internet protocol.
Article Details
Authors who publish with this journal agree to the following terms:
- Author (s) hold copyrights and retain copyrights of articles if the article is accepted for publishing.
- The author grants the journal, right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work’s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
- The article and any associated published material are distributed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Public allowed to Share (copy and redistribute the material in any medium or format) and Adapt (remix, transform, and build upon the material) this journal article content.
References
Barker, E. Roback, J. Nechvatal, J. Foti, L.
Bassham, M. Dworkin, and W. Burr,
“Report on the development of the
Advanced Encryption Standard (AES),” J.
Res. Natl. Inst. Stand. Technol., vol. 106,
no. 3, pp. 511–577, 2001.
Coulibaly and Lian Hao Liu, “Security of Voip
networks,” presented at the Computer
Engineering and Technology (ICCET),
2nd International Conference on,
, vol. 3, pp. V3–104.
Elbayoumy and S. J. Shepherd, “A Comprehensive
Secure VoIP Solution.,” IJ Netw.
Secur., vol. 5, no. 2, pp. 233–240, 2007.
Hendra, “Analisis Perbandingan Kinerja
Algoritma Twofish Dan Tea (Tiny
Encryption Algorithm) Pada Data Suara,”
J. Ilm. Mat. Terap., vol. 7, no. 1, 2012.
Johnston, B. Rosen, H. Kaplan, J. D. Rosenberg S.
A. Baset, and V. K. Gurbani “The session
initiation protocol (SIP): An evolutionary
study,” J. Commun., vol. 7, no. 2, pp. 89–
, 2012.
Jaber, Supriyanto, S. Manickam, and S.
Ramadass, “Highly effective filtration and
prevention framework for secure
incoming VoIP calls,” Int. J. Control
Autom., vol. 6, no. 3, pp. 95–102, 2013.
Setiawan, A. Fatchur Rochim, and R. R. Isnanto,
“Voice over Internet Protocol (VoIP)
Menggunakan Asterisk Sebagai Session
Initiation Protocol (SIP) Server,” Jurusan
Teknik Elektro Fakultas Teknik Undip,
Wang and Y.-S. Liu, “A dependable privacy
protection for end-to-end VoIP via
Elliptic-Curve Diffie-Hellman and dynamic
key changes,” J. Netw. Comput. Appl.,
vol. 34, no. 5, pp. 1545 – 1556, 2011.