Journal articles on the topic 'Secure portable document'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 35 journal articles for your research on the topic 'Secure portable document.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Khadim, Umair, Muhammad Munwar Iqbal, and Muhammad Awais Azam. "A Secure Digital Text Watermarking Algorithm for Portable Document Format (PDF)." Mehran University Research Journal of Engineering and Technology 41, no. 1 (2022): 100–110. http://dx.doi.org/10.22581/muet1982.2201.10.
Full textHuang, Kuo-Hsuan, Sung-Huai Hsieh, Yuan-Jen Chang, Feipei Lai, Sheau-Ling Hsieh, and Hsiu-Hui Lee. "Application of Portable CDA for Secure Clinical-document Exchange." Journal of Medical Systems 34, no. 4 (2009): 531–39. http://dx.doi.org/10.1007/s10916-009-9266-9.
Full textBernard, Renaldy Suteja, Victor Imbar Radiant, and Christianti Johan Meliana. "e-Certificate system based on Portable Document Format and QR Code for Academic Activities." International Journal of Computer Science Issues 17, no. 6 (2020): 87–91. https://doi.org/10.5281/zenodo.4431081.
Full textChen, Hai Yan, and Wei Liu. "Research on the Security Technology of Mobile Communication Information." Applied Mechanics and Materials 687-691 (November 2014): 2736–39. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2736.
Full textPatil, Prof. A. V., Rahul Khade, Shivani Lande, Sanika Jadhav, and Pranjali Garud. "PDF Malware Detection: Toward Machine Learning Modeling with Explainability Analysis." International Journal of Ingenious Research, Invention and Development (IJIRID) 4, no. 1 (2025): 178–88. https://doi.org/10.5281/zenodo.15187998.
Full textOrukpe, P. E., T. O. Erhiaguna, and F. O. Agbontaen. "Computer Security and Privacy in Wireless Local Area Network in Nigeria." International Journal of Engineering Research in Africa 9 (May 2013): 23–33. http://dx.doi.org/10.4028/www.scientific.net/jera.9.23.
Full textMedvedev, Iurii, Farhad Shadmand, Leandro Cruz, and Nuno Gonçalves. "Towards Facial Biometrics for ID Document Validation in Mobile Devices." Applied Sciences 11, no. 13 (2021): 6134. http://dx.doi.org/10.3390/app11136134.
Full textTaopan, Gever Imanuel, Meiton Boru, and Adriana Fanggidae. "Pengamanan Portable Document Format (PDF) Menggunakan Algoritma Kriptografi Kurva Eliptik." Jurnal Komputer dan Informatika 10, no. 1 (2022): 47–54. http://dx.doi.org/10.35508/jicon.v10i1.5296.
Full textMonika and Bansal Dipali. "Forensic Science Research Summary for Forgery Detection of Digital Images." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 1608–18. https://doi.org/10.35940/ijeat.B2563.029320.
Full textTaufan Maynard Prananda Sancaka1 and Veronica Lusiana. "Penerapan Metode Playfair Cipher Dalam Aplikasi Enkripsi- Dekripsi File Teks." Elkom : Jurnal Elektronika dan Komputer 15, no. 2 (2022): 260–70. http://dx.doi.org/10.51903/elkom.v15i2.937.
Full textWijaya, Hamid, Rima Ruktiari, and Muhammad Na'im Al Jum'ah. "Sosialisasi Penggunaan Webiste Sistem Informasi Pengelolaan Dokumen Arsip Kepegawaian Berbasis Digital di Fakultas Teknologi Informasi Universitas Sembilanbelas November Kolaka." Indonesia Berdaya 4, no. 2 (2023): 607–12. http://dx.doi.org/10.47679/ib.2023456.
Full textSAMIKSHA, M. DONGRE, A. PRABHALE AKSHADA, and H. B. SALE PROF. "ONLINE COLLEGE PORTAL." JournalNX - A Multidisciplinary Peer Reviewed Journal 3, no. 3 (2017): 75–78. https://doi.org/10.5281/zenodo.1462673.
Full textAzmi, Rizal Dian, and Siti Khoiruli Ummah. "Penyusunan LKPD Interaktif Berbantuan Liveworksheets Bagi Guru SMP." JAPI (Jurnal Akses Pengabdian Indonesia) 9, no. 1 (2024): 67–74. http://dx.doi.org/10.33366/japi.v9i1.5728.
Full textPurba, Eduard Eduard, Dedi Martono, and Heru Sukma. "ELEKTRONIK ARSIP (E-ARSIP) DOKUMEN BERBASIS WEBSITE PADA KANTOR CABANG UTAMA PT ANGKASA PURA II." ICIT Journal 4, no. 2 (2018): 202–13. http://dx.doi.org/10.33050/icit.v4i2.95.
Full textSheetal, P. Patil, D. Bhartiya Uday, Patil Harshita, and Patil Mayur. ""NyayEase - An Integrated Legal Assistant Platform"." Research & Reviews: Journal of Internet & Networking 1, no. 2 (2025): 1–13. https://doi.org/10.5281/zenodo.15524641.
Full textSatria, Tri Danu, Panji Suroso, and Adina Sastra Sembiring. "PENGEMASAN BAHAN AJAR KOMPUTER MUSIK DASAR BERBASIS E-LEARNING DI PRODI PENDIDIKAN MUSIK UNIVERSITAS NEGERI MEDAN." Grenek Music Journal 9, no. 1 (2020): 38. http://dx.doi.org/10.24114/grenek.v9i1.18013.
Full textNag, Sanjay, Nabanita Basu, Payal Bose, and Samir Kumar Bandyopadhyay. "A Novel Grammar-Based Approach for Patients’ Symptom and Disease Diagnosis Information Dissemination to Maintain Confidentiality and Information Integrity." Bioengineering 11, no. 12 (2024): 1265. https://doi.org/10.3390/bioengineering11121265.
Full textKittelsen, Käthe Elise, Randi Oppermann Moe, Tone Beate Hansen, Ingrid Toftaker, Jens Peter Christensen, and Guro Vasdal. "A Descriptive Study of Keel Bone Fractures in Hens and Roosters from Four Non-Commercial Laying Breeds Housed in Furnished Cages." Animals 10, no. 11 (2020): 2192. http://dx.doi.org/10.3390/ani10112192.
Full textZhu, Qinyu, Quan Chen, Yichen Liu, Zahid Akhtar, and Kamran Siddique. "Investigating TrustZone: A Comprehensive Analysis." Security and Communication Networks 2023 (April 14, 2023): 1–19. http://dx.doi.org/10.1155/2023/7369634.
Full textHanzha, A., and S. Antonenko. "Automation of development of Win32 desktop applications: Practical approaches and strategies." System technologies 1, no. 156 (2025): 12–22. https://doi.org/10.34185/1562-9945-1-156-2025-02.
Full textAlamsyah, Dedy. "PENGEMBANGAN PURWARUPA SISTEM PROTEKSI HYBRID KEASLIAN FAKTUR ELEKTRONIK (E-INVOICE) PADA E-BISNIS MENGGUNAKAN QR CODE, STEGANOGRAFI DAN KRIPTOGRAFI." Jurnal Teknik 5, no. 2 (2016). http://dx.doi.org/10.31000/jt.v5i2.351.
Full textAlamsyah, Dedy. "PENGEMBANGAN PURWARUPA SISTEM PROTEKSI HYBRID KEASLIAN FAKTUR ELEKTRONIK (E-INVOICE) PADA E-BISNIS MENGGUNAKAN QR CODE, STEGANOGRAFI DAN KRIPTOGRAFI." Jurnal Teknik 5, no. 2 (2016). http://dx.doi.org/10.31000/jt.v5i2.351.
Full textPondkule, Pooja M., and Sonali Kothari. "Implementation of blockchain-based document management system for higher education organizations." International Journal on Smart Sensing and Intelligent Systems 18, no. 1 (2025). https://doi.org/10.2478/ijssis-2025-0001.
Full textPolenakis, Iosif, Vasileios Vouronikos, Angjele Merolli, and Stavros D. Nikolopoulos. "A PDF watermarking scheme utilizing invisible QR code embedding in the spatial domain." Journal of Computer Security, July 9, 2025. https://doi.org/10.1177/0926227x251346082.
Full text"Forensic Science Research Summary for Forgery Detection of Digital Images." International Journal of Engineering and Advanced Technology 9, no. 3 (2020): 1608–18. http://dx.doi.org/10.35940/ijeat.b2563.029320.
Full textWandy, Wandy, Muhammad Agni Catur Bhakti, Daniel Stephen, et al. "Pelatihan Pengelolaan Situs Web dengan Sistem Manajemen Konten dan Panel Kontrol Secara Daring." Journal of Community Services: Sustainability and Empowerment 1, no. 02 (2021). http://dx.doi.org/10.35806/jcsse.v1i2.230.
Full textWijayanto, Wijayanto, Ika Menarianti, and Arif Wibisono. "Pengembangan Buku Sekolah Elektronik (BSE) Dilengkapi Media Evaluasi Mandiri Siswa Berbasis Protable Document Format." Jurnal Informatika Upgris 2, no. 2 (2017). http://dx.doi.org/10.26877/jiu.v2i2.1110.
Full text"Design and Implementation of Loan Management System using ISI Server, PhP and MySql." International Journal of Recent Technology and Engineering 8, no. 4 (2019): 8017–22. http://dx.doi.org/10.35940/ijrte.d4415.118419.
Full textFranco, Frattolillo. "A Web Oriented Spread Spectrum Watermarking Procedure for MPEG-2 Videos." November 20, 2008. https://doi.org/10.5281/zenodo.1071848.
Full textRakhimboev, Muzaffar, and Saparniyazov I.A. "The Critical Success Factors of Developing New Products in the Marketplace." November 9, 2019. https://doi.org/10.5281/zenodo.3533916.
Full textWatson, Robert. "E-Press and Oppress." M/C Journal 8, no. 2 (2005). http://dx.doi.org/10.5204/mcj.2345.
Full textSharma, Sarah. "The Great American Staycation and the Risk of Stillness." M/C Journal 12, no. 1 (2009). http://dx.doi.org/10.5204/mcj.122.
Full textCesarini, Paul. "‘Opening’ the Xbox." M/C Journal 7, no. 3 (2004). http://dx.doi.org/10.5204/mcj.2371.
Full textLisle, Debbie. "The 'Potential Mobilities' of Photography." M/C Journal 12, no. 1 (2009). http://dx.doi.org/10.5204/mcj.125.
Full textWilken, Rowan. "Walkie-Talkies, Wandering, and Sonic Intimacy." M/C Journal 22, no. 4 (2019). http://dx.doi.org/10.5204/mcj.1581.
Full text