Publications

ITEM 5 AND LATER ARE THE PUBLICATIONS AND PAPERS PRODUCED WITHIN MY CANDIDATURE

  1. Journal article: The Asymptotic Equipartition Property and Source Coding.  Jurnal Ilmu Pendidikan MIPA dan MIPA, Saintifika, PMIPA FKIP Universitas Jember, Vol. 5 No. 1, Maret 2004, pp 198-206.
  2. Journal article: Pendekatan Identifikasi Logik dalam Perkuliahan Struktur Aljabar (Logical Identification Approach in the Algebra Structure Lecture). Jurnal Ilmiah Nasional, PANCARAN PENDIDIKAN, FKIP Universitas Jember, No. 59 tahun XVII, Desember 2004, page 1-12.
  3. Book: Pemahaman dan Penyajian Konsep Matematika Secara Benar dan Menarik (Understanding and Serving Mathematics Concepts Which are Correct and Interesting). Mathematics Reference Book  for PGSD, Dit Ketenagaan Ditjen Dikti Depdiknas, November 2006 
  4. Journal article: Pendekatan Identifikasi Logik untuk Mengatasi Kesulitan Mahasiswa dalam Memahami Definisi dan Teorema pada Struktur Aljabar Lanjut (Logic Identification Approach for Solving Student Difficulties in Understanding Definition and Theorem in the Advance Algebra Structure).   Jurnal Ilmu Pendidikan MIPA dan MIPA, Saintifika, PMIPA FKIP Universitas Jember, Vol. 7 No. 2, Desember 2006, page 214-225.
  5. Poster: DRM’s rights protection capability: a review. Presented at the 2012 JCU Information Technology Department Open Day – August 2012.
  6. Abstract: Privacy-aware right protection systems: ideas for improving DRM. Presented at the 2012 JCU Faculty of Law, Business and Creative Arts (FLBCA) – Graduate Research Student Annual Conference at Seagull Resort – Belgian Garden, Townsville, Queensland, Australia, on 26 October 2012.
  7. Paper: DRM’s rights protection capability: a review. Presented at the First International Conference on Computational Science and Information Management (ICoCSIM) 2012. Parapat, Indonesia, on 3-5 December 2012. Appeared at the Proceedings of ICOCSIM 2012 Vol 1 (2012) pp. 12-17. ISBN 978-967-0120-60-7. Available online at ResearchOnline@JCU
  8. Paper: Obfuscation and WBC: Endeavour for Securing Encryption in the DRM Context. Presented at the International Conference on Computer Science and Information Technology (CSIT) 2013. UTY Jogjakarta, Indonesia, on 16 – 18 June 2013. Appeared at the proceedings of CSIT 2013 pp. 150 – 155. ISBN 978-979-3812-20-5
  9. Paper: Scenarios for Securing Content Delivery in the DRM Environment. Submitted to the ACISP 2013, Brisbane, Australia.
  10. Paper: A Review on Traitor Tracing Schemes. available online on JCU e-GRS repository.
  11. Paper: White-box Implementation to Advantage DRM. An extended version of paper presented at CSIT 2013 and submitted to a special issue journal related to the conference.
  12. Paper: Secure and Private Content Distribution in the DRM Environment. Presented at the Information System International Conference (ISICO) 2013, 2-3 December 2013, Bali, Indonesia. Appeared at the proceedings of ISICO 2013, p. 659-664, ISBN 978-979-18985-7-7. Available online at Open Access Journal of Information Systems (http://is.its.ac.id/pubs/oajis/index.php/home/detail/1156/Secure-and-Private-Content-Distribution-in-the-DRM-Environment). Also available at ResearchOnline@JCU
  13. Paper: Traitor Tracing Scheme to Counter Piracy Strategies. Submitted to the International Conference on Information Theoretic Security (ICITS) 2013, Singapore.
  14. Paper: Deterring Traitor Using Double Encryption Scheme. Presented at the IEEE International Conference on Communication, Network and Satellite (COMNETSAT) 2013, 3 – 4 December 2013, Jogjakarta – Indonesia. Appeared at the proceedings of IEEE COMNETSAT 2013 pp 100-104, ISBN 978-1-4673-6054-8. Available online at IEEE Xplore Digital Library and has been archived at ResearchOnline@JCU
  15. Paper: Oblivious Content Distribution for the DRM Applications. An extended version of paper for ISICO 2103 and ready for a journal associated with the conference.
  16. Paper: Blind Image Watermarking based on Chaotic Map. Presented at IEEE International Conference on Information Technology and Applications (ICITA) 2014, 1-4 July 2014, Sydney – Australia, ISBN: 978-0-9803267-6-5. Available online at Journal of IT in Industry, vol.2, no. 2, 2014, pp. 44-50, ISSN: 2203-1731, and has been archived at ReseachOnline@JCU.
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s