External Hard Disk

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 1110 Experts worldwide ranked by ideXlab platform

Nurul Hidayah Ab Rahman - One of the best experts on this subject based on the ideXlab platform.

  • email authentication using symmetric and asymmetric key algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and asymmetric key algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and asymmetric key algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Chuah Chai Wen, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.

Mohamad Azhar Abdul Halim - One of the best experts on this subject based on the ideXlab platform.

  • email authentication using symmetric and asymmetric key algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and asymmetric key algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and asymmetric key algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Chuah Chai Wen, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.

Nurul Azma Abdullah - One of the best experts on this subject based on the ideXlab platform.

  • email authentication using symmetric and asymmetric key algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and asymmetric key algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and asymmetric key algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Chuah Chai Wen, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.

Isredza Rahmi - One of the best experts on this subject based on the ideXlab platform.

  • email authentication using symmetric and asymmetric key algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and asymmetric key algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authent...

  • email authentication using symmetric and asymmetric key algorithm encryption
    AIP Conference Proceedings, 2017
    Co-Authors: Mohamad Azhar Abdul Halim, Isredza Rahmi, Nurul Azma Abdullah, Chuah Chai Wen, Nurul Hidayah Ab Rahman
    Abstract:

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, External Hard Disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.

Gendys Mitasari Adesta - One of the best experts on this subject based on the ideXlab platform.

  • PERANCANGAN PERANGKAT HOST USB 2.0 FLASH Disk ANTAR FLASH Disk UNTUK MENYALIN DATA DENGAN MENGGUNAKAN MIKROKONTROLER
    Universitas Telkom, 2013
    Co-Authors: Gendys Mitasari Adesta
    Abstract:

    ABSTRAKSI: USB flash drive merupakan media penyimpanan portable yang memiliki kapasitas penyimpanan yang cukup besar, namun berdimensi kecil. Hal ini menjadikan USB flash drivetipe ini atau biasa lebih dikenal dengan flash Disk atau pendrive lebih banyak digunakan oleh banyak orang daripada USB flash drive lain misalnya eksternal HardDisk portable. Namun, terkadang dijumpai kendala apabila tidak ada media (host) untuk menyalin atau mentransfer data yang tersimpan dalam flash Disk (flash Disk sumber) ke flash Disk lainnya (flash Disk tujuan). Pada Proyek Akhir ini, dibuat sebuah perangkat host yang berfungsi untuk menampilkan data yang tersimpan dalam USB flash drive (flash Disk) dan menyalin keseluruhan data yang tersimpan pada flash Disk tersebut. Perangkat ini terdiri dari empat blok, yaitu blok interface USBFlash Drive dengan menggunakan USB Host Controller(FTDI Vinculum VNC1L) yang akan menghubungkan flash Disk dan sistem pada perangkat, blok mikrokontroler ATMega8535 sebagai pengatur kerja sistem perangkat secara keseluruhan, blok LCD(Liquid Crystal Display) sebagai penampil data, dan blok catu daya sebagai penyuplai daya perangkat sebesar 5volt. Flash Disk dihubungkan dengan sistem perangkat melalui interface USB Host Controller, kemudian perangkat akan membaca data yang tersimpan dalam flash Disk, menampilkannya pada LCD yang berukuran 20x4, dan menyalin seluruh data yang tersimpan ke flash Disk tujuan.Kata Kunci : USB Flash Drive, FTDI VNC1L, LCD, AVR ATMEGA8535ABSTRACT: USB flash drive is a portable storage media that have a large enough storage capacity but in small dimension. It makes USB flash drive with this type or better known as flash Disks are used by more people than any other USB flash drive as a portable External Hard Disk. However, sometimes encountered problems when there is no media (host) to copy or transfer the data stored in the flashDisk (flash Disk source) to another flash Disk (flash Disk target). In this final project, created a host device that serves to display the data stored in the USB flash drive (flash Disk) and copy the entire data stored on the flash Disk target. The device consists of four blocks, namely block USB Flash Disk interface using the USB Host Controller that will connect the flash Disk and the system on the device, as the regulator block ATMega8535 microcontroller devices work, block LCD (Liquid Crystal Display) as a data displayer, and block power supply as power supplies devices with 5volt. Flash Disk is connected to the system via the USB Host Controller interface, then the device will read the data stored in the flash Disk, display it on LCD20x4 size, and copy all the data stored on the flash Disk target.Keyword: USB Flash Drive, FTDI VNC1L, LCD, AVR ATMEGA853