Authentication System and Method for Improving Security Login without Typing Password
How to cite (IJASEIT) :
E. A. Dharmawan, E. Yudaningtyas and M. Sarosa, “Perlindungan Web pada Login Sistem Menggunakan Algoritma Rijndael,” EECCIS, pp. 77-84, 2013.
D. M. Khairina, “Analisis Keamanan Sistem Login,” Jurnal Informatika Mulawarman, vol. Vol. 6 No. 2, pp. 64-67, 2011.
R. S. Gusman, “Analisis dan Implementasi Two Factor Authentication dengan QRCode Pada Aplikasi Berbasis Web,” UT - Computer Science, pp. 1-22, 2013.
A. D. Tumuli, X. N. Najoan and A. M. Sambul, “Implementasi Teknologi Biometrical Identification untuk Login Hotspot,” E-Journal Teknik Informatika, Vols. Vol.12, No. 1, pp. 1-5, 2017.
J. Wei, W. Liu and X. Hu, “Secure and Efficient Smart Card Based Remote User Password Authentication Scheme,” International Journal of Network Security, Vols. Vol.18, No.4, pp. 782-791, 2016.
A. Rahmatulloh and R. Munir, “Pencegahan Ancaman Reverse Engineering Source Code PHP dengan Teknik Obfuscation Code pada Extension PHP,” in Konferensi Nasional Informatika, Bandung, 2015.
K. I. Santoso, E. Sediyono and S., “Studi Pengamanan Login Pada Sistem Informasi Akademik Menggunakan Otentifikasi One Time Password Berbasisis SMS dengan Hash MD5,” Sistem Informasi Bisnis, pp. 7-12, 2013.
I. G. N. A. Jayarana, A. A. K. A. Cahyawan and G. M. A. Sasmita, “Dynamic Mobile Token for Web Security using MD5 and One Time Password Method,” International Journal of Computer Applications, Vols. Volume 55-No 6, pp. 1-6, 2012.
A. Rahman and A. Rahmawati, “Sistem Pengamanan Keaslian Ijasah Menggunakan QR-Code dan Algoritma Base64,” JUSI Vol. 1, No. 2, pp. 105-112, 2011.
Z. Arifin, “Studi Kasus Penggunaan Algoritma RSA Sebagai Algoritma Kriptografi yang Aman,” Jurnal Informatika Mulawarman, pp. 7-14, 2009.
M. Arifin, A. Bejo and W. Najib, “Integrasi Login Tanpa Mengetik Password pada Wordpress,” JNTETI, Vol. 6, No. 2, pp. 162-167, 2017.
K. Adhatrao, A. Gaykar, R. Jha and V. Honrao, “A Secure Method For Signing In Using Quick Response Codes With Mobile Authentication,” International Journal of Student Research in Technology & Management, vol. Vol 1(1), pp. 1-11, 2013.
M. I. Zulfa and E. Subiyanta, “Pemanfaatan Spyware Untuk Monitoring Aktivitas Keyboard Dalam Jaringan Microsoft Windows,” Jurnal Emitor, vol. Vol. 15 No. 01., pp. 11-14, 2007.
Y. Kita, F. Sugai, M. Park and N. Okazaki, “Proposal and its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method: Secret Tap with Double Shift,” International Journal of Cyber-Security and Digital Forensics (IJCSDF), vol. 2(1), pp. 48-55, 2013.
M. Kumar, T. Garfinkel, D. Boneh and T. Winograd, “Reducing Shoulder-surfing by Using Gaze-based Password Entry,” pp. 1-7, 2007.
Z. Musliyana, T. Y. Arif and R. Munadi, “Peningkatan Sistem Keamanan Autentikasi Single Sign On (SSO) Menggunakan Algoritma AES dan One-Time Password Studi Kasus: SSO Universitas Ubudiyah Indonesia,” Jurnal Rekayasa Elektrika, vol. Vol.12 No.1, pp. 21-29, 2016.
M. F. Adriant and I. M., “Implementasi Wireshark Untuk Penyadapan (Sniffing) Paket Data Jaringan,” Seminar Nasional Cendekiawan, pp. 224-228, 2015.
ISO/IEC, Information Technology - Automatic Identification and Data Capture Techniques - Bar Code Symbology - QR Code, Swizerland: International Standard, 2000.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).