Kriteria Otentikasi Dokumen Elektronik dengan Weighted Product
DOI:
https://doi.org/10.25273/research.v4i1.7156Keywords:
Keamanan Informasi, Tanda Tangan Digital, Verifikasi, Weighted ProductAbstract
Downloads
References
L. Refialy, E. Sediyono, and A. Setiawan, “Pengamanan Sertifikat Tanah Digital menggunakan Digital Signature SHA-512 dan RSA,†J. Tek. Inform. dan Sist. Inf., vol. 1, no. 3, pp. 229–234, 2015, doi: 10.28932/jutisi.v1i3.400.
P. A. Publication, “Ind ( 12 ),†2019.
S. L. City, P. Examiner, and B. E. Gregory, “United States Patent,†1999.
K. T. Naramessakh and C. Prianto, “Otomatisasi Keputusan Pemberian Kredit Pensiun Menggunakan Metode Weighted Product,†Efisiensi - Kaji. Ilmu Adm., vol. 16, no. 1, pp. 33–48, 2019, doi: 10.21831/efisiensi.v16i1.24475.
S. A. F. and R. A. S. N. S. Fitriasari, “Comparison of weighted product method and technique for order preference by similarity to ideal solution method: Complexity and accuracy,†3rd Int. Conf. Sci. Inf. Technol., pp. 453–458, 2017.
M. Ahsan and N. Indawati, “Implementation weighted product method to determine multiple intelligence child,†J. Phys. Conf. Ser., vol. 1375, no. 1, 2019, doi: 10.1088/1742-6596/1375/1/012038.
A. Arief and R. Saputra, “Implementasi Kriptografi Kunci Publik dengan Algoritma RSA-CRT pada Aplikasi Instant Messaging,†Sci. J. Informatics, vol. 3, no. 1, pp. 46–54, 2016, doi: 10.15294/sji.v3i1.6115.
I. Algoritma, R. S. A. Rivest, D. File, J. K. Azhar, and S. Yuliany, “Implementasi Algoritma RSA ( Rivest , Shamir dan,†no. December, 2019.
O. K. Sulaiman, M. Ihwani, and S. F. Rizki, “Model Keamanan Informasi Berbasis Tanda Tangan Digital Dengan Data Encryption Standard (Des) Algorithm,†InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 1, no. 1, pp. 14–19, 2016, doi: 10.30743/infotekjar.v1i1.82.
M. Ray Rizaldy, “Perbandingan Tanda Tangan Digital RSA dan DSA Serta Implementasinya untuk Antisipasi Pembajakan Perangkat Lunak,†2009.
Basri, “Kriptografi Simetris Dan Asimetris Dalam Perspektif Keamanan Data Dan Kompleksitas Komputasi,†J. Ilm. Ilmu Komput., vol. 2, no. 2, pp. 17–23, 2016, [Online]. Available: http://ejournal.fikom-unasman.ac.id.
J. Schwartze, B. Haarbrandt, D. Fortmeier, R. Haux, and C. Seidel, “Authentication systems for securing clinical documentation workflows: A systematic literature review,†Methods Inf. Med., vol. 53, no. 1, pp. 3–13, 2014, doi: 10.3414/ME12-01-0078.
J. P. Vokasi et al., “Development of CSE-UCLA evaluation model modified by using weighted product in order to optimize digital library services in higher education of computer in Bali,†J. Pendidik. Vokasi, vol. 7, no. 3, pp. 275–287, 2018, doi: 10.21831/jpv.v7i3.13370.
D. M. Khairina, D. Ivando, and S. Maharani, “47-1-139-1-10-20160929,†vol. 8, no. 1, pp. 1–8, 2016.
Oktafianto et al., “Determining housing location using weighted product,†Int. J. Eng. Technol., vol. 7, no. 4, pp. 3563–3568, 2018, doi: 10.14419/ijet.v7i4.18838.
Downloads
Additional Files
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).