Penerapan Algoritma Rivest-Shamir-Adleman (RSA) pada Enkripsi Uniform Resource Locator (URL) Website untuk Keamanan Data
Abstract
Keywords
Full Text:
PDFReferences
M. M. Purba and C. Rahmat, “Perancangan Sistem Informasi Stok Barang Berbasis Web di PT Mahesa Cipta,” JSI (Jurnal Sistem Informasi) Universitas Suryadarma, vol. 8, no. 2, pp. 123–158, 2021, doi: https://doi.org/10.35968/jsi.v8i2.721.
J. Saputra Irsandi, I. Fitri, N. D. Nathasia, and K. Kunci, “Sistem Informasi Pemasaran dengan Penerapan CRM (Customer Relationship Management) Berbasis Website menggunakan Metode Waterfall dan Agile,” Jurnal Teknologi Informasi dan Komunikasi), vol. 5, no. 4, p. 2021, 2021, doi: 10.35870/jti.
A. P. Aryani and L. E. Susanti, “Pentingnya Perlindungan Data Pribadi Konsumen dalam Transaksi Online pada Marketplace terhadap Kepuasan Konsumen,” Ahmad Dahlan Legal Perspective, vol. 2, no. 1, pp. 20–29, 2022, doi: https://doi.org/10.12928/adlp.v2i1.5610.
G. Susilo, “Keamanan basis data pada sistem informasi di era global,” Transformasi, vol. 12, no. 2, 2017, doi: https://doi.org/10.56357/jt.v12i2.70.
N. I. Putri, R. Komalasari, and Z. Munawar, “Pentingnya keamanan data dalam intelijen bisnis,” J-SIKA| Jurnal Sistem Informasi Karya Anak Bangsa, vol. 2, no. 02, pp. 41–48, 2020.
R. Andriyanto, K. Khairijal, and D. Satria, “Penerapan Kriptografi AES Class Untuk Pengamanan URL WEBSITE Dari Serangan SQL INJECTION,” Jurnal Unitek, vol. 13, no. 1, pp. 34–48, 2020, doi: https://doi.org/10.52072/unitek.v13i1.153.
I. P. A. E. Pratama, “Pengujian performansi lima back-end javascript framework menggunakan metode GET dan POST,” Jurnal Resti (Rekayasa Sistem dan Teknologi Informasi), vol. 4, no. 6, pp. 1216–1225, 2020, doi: https://doi.org/10.29207/resti.v4i6.2675.
U. D. R. Z. M. Luthfansa and U. D. U. Rosiani, “Pemanfaatan Wireshark untuk Sniffing Komunikasi Data Berprotokol HTTP pada Jaringan Internet,” Journal Information Engineering and Educational Technology) ISSN, vol. 2549, p. 869X, 2021.
CNN Indonesia, “10 Kasus Kebocoran Data 2022 : Bjorka Dominan, Ramai-Ramai Bantah,” 2022. Accessed: Mar. 15, 2023. [Online]. Available: https://www.google.com/amp/s/www.cnnindonesia.com/teknologi/20221230125430-192-894094/10-kasus
A. R. Kelrey and A. Muzaki, “Pengaruh Ethical Hacking Bagi Keamanan Data Perusahaan,” Cyber Security dan Forensik Digital, vol. 2, no. 2, pp. 77–81, 2019, doi: https://doi.org/10.14421/csecurity.2019.2.2.1625.
D. Ariyus, Pengantar Ilmu Kriptografi : Teori Analisis dan Implementasi. Yogyakarta: CV. ANDI Offset, 2008.
M. A. Al-Shabi, “A survey on symmetric and asymmetric cryptography algorithms in information security,” International Journal of Scientific and Research Publications (IJSRP), vol. 9, no. 3, pp. 576–589, 2019, doi: http://dx.doi.org/10.29322/IJSRP.X.X.2018.pXXXX.
M. Y. Simargolang, “Implementasi Kriptografi Rsa Dengan Php,” (JurTI) Jurnal Teknologi Informasi, vol. 1, no. 1, pp. 1–10, 2017.
R. Munir, Matematika Diskrit, 3rd ed. Bandung: INFORMATIKA Bandung, 2010.
DOI: https://doi.org/10.37905/euler.v11i2.21169
Refbacks
- There are currently no refbacks.
Copyright (c) 2023 Theodora Tantri Trisnawati, Sherli Yurinanda, Wardi Syafmen, Cut Multahadah
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi has been indexed by:
EDITORIAL OFFICE OF EULER : JURNAL ILMIAH MATEMATIKA, SAINS, DAN TEKNOLOGI |
Department of Mathematics, Faculty of Mathematics and Natural Science, Universitas Negeri Gorontalo Jl. Prof. Dr. Ing. B. J. Habibie, Tilongkabila, Kabupaten Bone Bolango 96554, Gorontalo, Indonesia |
Email: euler@ung.ac.id |
+6287743200854 (WhatsApp Only) |
Euler : Jurnal Ilmiah Matematika, Sains dan Teknologi (p-ISSN: 2087-9393 | e-ISSN:2776-3706) by Department of Mathematics Universitas Negeri Gorontalo is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Powered by Public Knowledge Project OJS. |