Search Results - "Susilo, W."
-
1
Genetic diversity and parentage in farmer selections of cacao from Southern Sulawesi, Indonesia revealed by microsatellite markers
Published in Breeding Science (01-12-2015)“…Indonesia is the third largest cocoa-producing country in the world. Knowledge of genetic diversity and parentage of farmer selections is important for…”
Get full text
Journal Article -
2
Draft genome sequence of fastidious pathogen Ceratobasidium theobromae , which causes vascular-streak dieback in Theobroma cacao
Published in Fungal biology and biotechnology (30-09-2019)“…, a member of the family, is the causal agent of vascular-streak dieback (VSD) of cacao, a major threat to the chocolate industry in the South-East Asia. The…”
Get full text
Journal Article -
3
Mediated Encryption: Analysis and Design
Published in EAI endorsed transactions on security and safety (01-01-2015)“…Boneh, Ding and Tsudik presented identity-based mediated RSA encryption and signature systems in which the users are not allowed to decrypt/sign messages…”
Get full text
Journal Article -
4
The effectiveness of Nusantara Instrumental As Music Therapy for Decreasing Pain In the First Stage of Labor
Published in Media keperawatan Indonesia (Online) (25-02-2022)“…Labor pain is a series of physiological factors due to uterine contractions and cervical dilation along with mental and emotional factors. One of the…”
Get full text
Journal Article -
5
Clonal differences in nitrogen use efficiency and macro-nutrient uptake in young clonal cocoa (Theobroma cacao L.) seedlings from Indonesia
Published in Journal of plant nutrition (14-12-2022)“…Nitrogen (N) is one of the most required nutrients in cocoa production. Unlike in many other crops, there is limited knowledge on genotypic variation in…”
Get full text
Journal Article -
6
Testing local cocoa selections in three provinces in Sulawesi: (i) Productivity and resistance to cocoa pod borer and Phytophthora pod rot (black pod)
Published in Crop protection (01-04-2015)“…Trials were established on smallholder cocoa farms in three provinces in Sulawesi to assess productivity and constitutive responses of local cocoa clones to…”
Get full text
Journal Article -
7
On-farm selection for quality and resistance to pest/diseases of cocoa in Sulawesi: (i) performance of selections against cocoa pod borer, Conopomorpha cramerella
Published in International journal of pest management (01-12-2009)“…In Sulawesi, Indonesia, cocoa smallholdings are seriously affected by the cocoa pod borer (Conopomorpha cramerella, CPB). CPB is detrimental to both cocoa…”
Get full text
Journal Article -
8
Cocoa Clones Reveal Variation in Plant Biomass, Root Nitrogen Uptake, and Apparent Nitrogen Recovery at the Seedling Stage
Published in Journal of soil science and plant nutrition (01-12-2022)“…We aimed to investigate variation in growth, biomass, macro-nutrient uptake, and nitrogen (N) use efficiency indices of cocoa ( Theobroma cocoa L.) scion…”
Get full text
Journal Article -
9
Securing handheld devices
Published in Proceedings 10th IEEE International Conference on Networks (ICON 2002). Towards Network Superiority (Cat. No.02EX588) (2002)“…Handheld devices are becoming an indispensable part of everyday life. In this paper, we review the security of handheld devices, which are based on the Pocket…”
Get full text
Conference Proceeding -
10
On-farm selection for quality and resistance to pest/diseases of cocoa in Sulawesi: (ii) quality and performance of selections against Phytophthora pod rot and vascular-streak dieback
Published in International journal of pest management (01-01-2010)“…The cocoa industry in Sulawesi, the main region of cocoa production in Indonesia, is threatened by destructive diseases, including vascular-streak dieback…”
Get full text
Journal Article -
11
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
Published in IEEE transactions on parallel and distributed systems (01-11-2012)“…Decentralized attribute-based encryption (ABE) is a variant of a multiauthority ABE scheme where each authority can issue secret keys to the user independently…”
Get full text
Journal Article -
12
Efficient Fair Conditional Payments for Outsourcing Computations
Published in IEEE transactions on information forensics and security (01-12-2012)“…The outsourcing computations in distributed environments suffer from the trust problems between the outsourcer and the workers. All existing solutions only…”
Get full text
Journal Article -
13
Web filtering using text classification
Published in The 11th IEEE International Conference on Networks, 2003. ICON2003 (2003)“…Web filtering is used to prevent access to undesirable Web pages. In this paper we review a number of existing approaches and point out the shortcomings of…”
Get full text
Conference Proceeding -
14
Accountable identity-based encryption with distributed private key generators
Published in Information sciences (01-12-2019)“…Distributed private key generators (PKGs) in identity-based encryption (IBE) is a viable approach to mitigate the inherent key escrow problem, where the user’s…”
Get full text
Journal Article -
15
Genetic Identity, Ancestry and Parentage in Farmer Selections of Cacao from Aceh, Indonesia Revealed by Single Nucleotide Polymorphism (SNP) Markers
Published in Tropical plant biology (01-12-2014)“…Cacao (Theobroma cacao L.), the source of cocoa powder and cocoa butter used for chocolate, originated in the rainforests of South America. Indonesia is the…”
Get full text
Journal Article -
16
A New and Efficient Fail-stop Signature Scheme
Published in Computer journal (01-01-2000)“…The security of ordinary digital signature schemes relies on a computational assumption. Fail-stop signature schemes provide security for a sender against a…”
Get full text
Journal Article -
17
Secure sharing and searching for real-time video data in mobile cloud
Published in IEEE network (01-03-2015)“…In this article we propose an infrastructure that allows mobile users to securely share and search for their real-time video data. Specifically, the proposed…”
Get full text
Journal Article -
18
Certificateless Signatures: New Schemes and Security Models
Published in Computer journal (01-04-2012)“…We present a study of security in certificateless signatures. We divide potential adversaries according to their attack power, and for the first time, three…”
Get full text
Journal Article -
19
Secure and anonymous mobile ad-hoc networks
Published in 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic (2005)“…A mobile ad-hoc network (MANET) is a wireless network made up of mobile hosts that do not require any fixed infrastructure to communicate. The major features…”
Get full text
Conference Proceeding -
20
Slot-less Tubular Linear Permanent Magnet Generator Using Halbach-Array Excitation
Published in 2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE) (01-07-2018)“…Slot-less generator attracts many researches because of high efficiency it provides. Moreover, Slot-less generator does not have cogging force that affects…”
Get full text
Conference Proceeding