<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<mods version="3.3" ID="2893">
<titleInfo>
<title>The Implementation of the Advanced Encryption Standard (AES) Encryption Algorithm For Computer File Security</title>
</titleInfo>
<name type="Personal Name" authority="">
<namePart>Mokhamad Hendayun</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="Personal Name" authority="">
<namePart>Iwan Abadi</namePart>
<role><roleTerm type="text">Additional Author</roleTerm></role>
</name>
<name type="Personal Name" authority="">
<namePart>Marulan Heryanto Samosir</namePart>
<role><roleTerm type="text">Additional Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<genre authority="marcgt">bibliography</genre>
<originInfo>
<place><placeTerm type="text"></placeTerm></place>
<publisher></publisher>
<dateIssued>2014</dateIssued>
<issuance>monographic</issuance>
<edition></edition>
</originInfo>
<language>
<languageTerm type="code">en</languageTerm>
<languageTerm type="text">ENGLISH</languageTerm>
</language>
<physicalDescription>
<form authority="gmd">Text</form>
<extent></extent>
</physicalDescription>
<note>A file is related collection of record or file, that can be translated into archive/data and then stored in secondary storage, such as magnetic disk and magnetic tape. File maycontain texts, images, video, audio or combinations of them. Security of computer files is essential to implement, because the files can be stolen by unauthorized person. Therefore we need a method to secure files, method of securing files that are often 
used include cryptographic. By using the methods of cryptography, files will be encrypted by means of randomizing. Encryption will change the record or text (plain text) into recordthat can not be read (cipher text). There are several algorithms that can be used to encrypt the file, one of them is Advanced Encryption standad (AES). Hence in this study will be discussedthe solutions to problems with file security algorithm using AES, so that the file is safe from people who are not responsible.</note>
<classification>NONE</classification><identifier type="isbn"></identifier><location>
<physicalLocation>Repository Universitas Langlangbuana Sistem Repository Elektronik Skripsi, Tesis, Desertasi dan Penelitian Dosen Universitas Langlangbuana</physicalLocation>
<shelfLocator></shelfLocator>
</location>
<slims:digitals>
<slims:digital_item id="14869" url="repository/2014 - AEMT Proc-Int.Conference- TIDAK ADA MATERI" path="/2014 - AEMT Proc-Int.Conference- TIDAK ADA MATERI.pdf" mimetype="application/pdf">AEMT Proc-Int.Conference</slims:digital_item>
<slims:digital_item id="14870" url="repository/2014 - Implementation of AES - Proc.Int.Conf. - MH-IA-MHS" path="/2014 - Implementation of AES - Proc.Int.Conf. - MH-IA-MHS.pdf" mimetype="application/pdf">The Implementation of the Advanced Encryption Standard (AES) Encryption Algorithm For Computer File Security</slims:digital_item>
</slims:digitals><slims:image>Cover_AEMT_Proc-Int.Conference.png.png</slims:image>
<recordInfo>
<recordIdentifier>2893</recordIdentifier>
<recordCreationDate encoding="w3cdtf">2024-01-08 06:11:40</recordCreationDate>
<recordChangeDate encoding="w3cdtf">2024-01-08 06:33:12</recordChangeDate>
<recordOrigin>machine generated</recordOrigin>
</recordInfo></mods></modsCollection>