Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Galinium, Maulahikmah
add a person with the name Galinium, Maulahikmah
 

Other publications of authors with the same name

Design and Implementation of the Connectionless Network Protocol (CLNP) as Loadable Kernel Modules in Linux Kernel 2.6, , , , , , , , and . CoRR, (2012)Secure Messaging Implementation in OpenSC., , , and . J. Information Security, 3 (4): 251-258 (2012)Understanding and granting android permissions: A user survey., , , , , , and . ICCST, page 1-6. IEEE, (2017)Case Studies: Business and Technical Perspectives in Migration of Legacy Systems to Service Oriented Architecture., and . CoRR, (2014)State space blow-up in the verification of secure smartcard interoperability., , , and . ICCST, page 119-125. IEEE, (2012)Deep Learning Analysis in Development of Handwritten and Plain Text Classification API., , , , and . ICONETSI, page 30:1-30:8. ACM, (2022)Interleaving Command Sequences: a Threat to Secure Smartcard Interoperability, , , and . CoRR, (2012)Interleaving Commands: a Threat to the Interoperability of Smartcard Based Security Applications, , , and . CoRR, (2012)Simulation based verification of concurrent processing on security devices., , , and . SysCon, page 82-87. IEEE, (2013)Backend Development of Online Marketplace for Male Beauty Care Services., , and . ICONETSI, page 42:1-42:5. ACM, (2020)