Marzuki Marzuki Marzuki
dosen

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : JAKSTIK Magazine

COMPANIES IN THE DATA WAREHOUSE IMPLEMENTATION Marzuki Marzuki Marzuki
Majalah SIKOMTEK Vol 4, No 1 (2004): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data warehouse is a concept and a combination of technologies that facilitate theorganization to manage and maintain historical data obtained from the system or operationalapplications. Data warehouses collect historical data which can then be used as acomprehensive material for management to be able to take decisions, the analysis oforganizational needs, to forecasting organizations based on the data. Data warehouse allowsintegration of various types of data from a variety of applications or systems. This ensures theaccess mechanism 'one-stop shop' for management to obtain information and analyze it forthe decision organizational development. Within an organization, data warehouse can be usedas weapons in competing. This paper will discuss the implementation of data warehousewithin the company.
Twofish cryptographic APPLICATION FOR SAFETY DATA COMPUTER Marzuki Marzuki Marzuki
Majalah SIKOMTEK Vol 5, No 1 (2005): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Twofish is a 128-bit block cipher that can accept variable length keys up to 256 bits. Cipheris a 16 round Feistel network with a bijective F function consists of four key-dependent 8-by-8-bit S-Box, a constant of 4-by-four as the maximum distance to the reference matrix areseparated on GF teripisah ( 28), a "pseudo-Hadamard transformation, according to the roundbit, and a key schedule that is designed carefully. Twofish can be implemented in hardwarewith 14 000 gates. The design works for both rounds of the key schedule permits a widetradeoff between speed, software size, setting time, the composition of the gates, andmemory. Kriptanalisis Twofish has extensive property, ie attacks can be solved in five roundswith 222.5 plaintexts and 251 effort choices.
SECURITY ENCAPSULATING PAYLOAD IP SECURITY PROTOCOL IN AS Marzuki Marzuki Marzuki
Majalah SIKOMTEK Vol 6, No 1 (2006): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Today's world of information about crime on the Internet computer network, such as attacks,especially viruses, worms, Trojans, Denial of Service (DoS), Web defacement, hijackingsoftware, up to the problem of theft of credit card more often adorned the pages of massmedia. Crime in the world of computers continues to increase in line with the developmentand advancement of science and technologies in this field. This challenge is actually alreadyappeared since the beginning. Encapsulating security payload (ESP) is a protocol used inInternet Protocol Security (IPSec) and in addition the Authentication Header (AH) is anotherprotocol which is a service that provides confidentiality, and authentication.In this article will discuss about the encapsulating protocol IPsec Security as a service.