Kriteria Otentikasi Dokumen Elektronik dengan Weighted Product
Abstract
Keywords
Full Text:
PDFReferences
L. Refialy, E. Sediyono, and A. Setiawan, “Pengamanan Sertifikat Tanah Digital menggunakan Digital Signature SHA-512 dan RSA,” J. Tek. Inform. dan Sist. Inf., vol. 1, no. 3, pp. 229–234, 2015, doi: 10.28932/jutisi.v1i3.400.
P. A. Publication, “Ind ( 12 ),” 2019.
S. L. City, P. Examiner, and B. E. Gregory, “United States Patent,” 1999.
K. T. Naramessakh and C. Prianto, “Otomatisasi Keputusan Pemberian Kredit Pensiun Menggunakan Metode Weighted Product,” Efisiensi - Kaji. Ilmu Adm., vol. 16, no. 1, pp. 33–48, 2019, doi: 10.21831/efisiensi.v16i1.24475.
S. A. F. and R. A. S. N. S. Fitriasari, “Comparison of weighted product method and technique for order preference by similarity to ideal solution method: Complexity and accuracy,” 3rd Int. Conf. Sci. Inf. Technol., pp. 453–458, 2017.
M. Ahsan and N. Indawati, “Implementation weighted product method to determine multiple intelligence child,” J. Phys. Conf. Ser., vol. 1375, no. 1, 2019, doi: 10.1088/1742-6596/1375/1/012038.
A. Arief and R. Saputra, “Implementasi Kriptografi Kunci Publik dengan Algoritma RSA-CRT pada Aplikasi Instant Messaging,” Sci. J. Informatics, vol. 3, no. 1, pp. 46–54, 2016, doi: 10.15294/sji.v3i1.6115.
I. Algoritma, R. S. A. Rivest, D. File, J. K. Azhar, and S. Yuliany, “Implementasi Algoritma RSA ( Rivest , Shamir dan,” no. December, 2019.
O. K. Sulaiman, M. Ihwani, and S. F. Rizki, “Model Keamanan Informasi Berbasis Tanda Tangan Digital Dengan Data Encryption Standard (Des) Algorithm,” InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 1, no. 1, pp. 14–19, 2016, doi: 10.30743/infotekjar.v1i1.82.
M. Ray Rizaldy, “Perbandingan Tanda Tangan Digital RSA dan DSA Serta Implementasinya untuk Antisipasi Pembajakan Perangkat Lunak,” 2009.
Basri, “Kriptografi Simetris Dan Asimetris Dalam Perspektif Keamanan Data Dan Kompleksitas Komputasi,” J. Ilm. Ilmu Komput., vol. 2, no. 2, pp. 17–23, 2016, [Online]. Available: http://ejournal.fikom-unasman.ac.id.
J. Schwartze, B. Haarbrandt, D. Fortmeier, R. Haux, and C. Seidel, “Authentication systems for securing clinical documentation workflows: A systematic literature review,” Methods Inf. Med., vol. 53, no. 1, pp. 3–13, 2014, doi: 10.3414/ME12-01-0078.
J. P. Vokasi et al., “Development of CSE-UCLA evaluation model modified by using weighted product in order to optimize digital library services in higher education of computer in Bali,” J. Pendidik. Vokasi, vol. 7, no. 3, pp. 275–287, 2018, doi: 10.21831/jpv.v7i3.13370.
D. M. Khairina, D. Ivando, and S. Maharani, “47-1-139-1-10-20160929,” vol. 8, no. 1, pp. 1–8, 2016.
Oktafianto et al., “Determining housing location using weighted product,” Int. J. Eng. Technol., vol. 7, no. 4, pp. 3563–3568, 2018, doi: 10.14419/ijet.v7i4.18838.
Article Metrics
Abstract has been read : 454 timesPDF file viewed/downloaded: 0 times
DOI: http://doi.org/10.25273/research.v4i1.7156
Refbacks
- There are currently no refbacks.
This work by Research is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.