Institut Teknologi Nasional | 87
DAFTAR PUSTAKA
Chandra, H. A., Wijaya, Y. I., & Budiman, H. (2019). Algoritma One Time Password pada Sistem Informasi Penerimaan Siswa Baru Online SMP H.A.
Johansyah.A Banjarmasin. Technologia, 10(4), 207–211.
https://doi.org/10.31602/tji.v10i4.2425
Dewi Andriani.( 2020). Perlunya Tingkatkan Jaringan Internet di Masa New Normal. (https://teknologi.bisnis.com/read/20200805/84/1275606/perlunya- ingkatkan-jaringan-internet-di-masa-new-normal) diakses pada 20 September 2020)
Fakhrusy, M. (2013). Implementasi HMAC-SHA-3-Based One Time Password pada Skema Two-Factor Authentication. (13612020), 1–6.
H., Z., A., H., & M., M. (2015). Internet of Things (IoT): Definitions, Challenges and Recent Research Directions. International Journal of Computer Applications, 128(1), 37–47. https://doi.org/10.5120/ijca2015906430
Huseynov, E., & Seigneur, J. M. (2016). WiFiOTP: Pervasive two-factor authentication using Wi-Fi SSID broadcasts. Proceedings of the 2015 ITU Kaleidoscope: Trust in the Information Society, K-2015 - Academic Conference, 3. https://doi.org/10.1109/Kaleidoscope.2015.7383630
Janakiraman, S., Sree, K. S., Manasa, V. L., Rajagopalan, S., Thenmozhi, K., &
Amirtharajan, R. (2018). for User Authentication. 2018 International Conference on Computer Communication and Informatics (ICCCI), 1–5.
Kolhatkar, C., Joshi, B., Choudhari, P., & Bhuva, D. (2018). Smart E-dustbin. 2018 International Conference on Smart City and Emerging Technology, ICSCET 2018, 1–3. https://doi.org/10.1109/ICSCET.2018.8537245
Kurniawan, F., Kusyanti, A., & Nurwarsito, H. (2017). Analisis dan Implementasi Algoritma SHA-1 dan SHA-3 pada Sistem Autentikasi Garuda Training Cost.
Jurnal Pengembangan Teknologi Informasi Dan Ilmu Komputer, 1(9), 803–
Institut Teknologi Nasional | 88 812. Retrieved from http://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/247 Maulana, F. R., Widyanto, T. A. S., Pratama, Y., & Mutijarsa, K. (2018). Design
and Development of Smart Trash Bin Prototype for Municipal Solid Waste Management. Proceeding - 2018 International Conference on ICT for Smart Society: Innovation Toward Smart Society and Society 5.0, ICISS 2018, 1–6.
https://doi.org/10.1109/ICTSS.2018.8550013
Singh, A., & Raj, S. (2019). Securing password using dynamic password policy generator algorithm. Journal of King Saud University - Computer and Information Sciences, (xxxx). https://doi.org/10.1016/j.jksuci.2019.06.006 Srivastava, S., & Sivasankar, M. (2016). On the generation of alphanumeric one
time passwords. Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016, 1(i), 1–3.
https://doi.org/10.1109/INVENTIVE.2016.7823287
Sudar, C., Arjun, S. K., & Deepthi, L. R. (2017). Time-based one-time password for Wi-Fi authentication and security. 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017, 2017-Janua, 1212–1215. https://doi.org/10.1109/ICACCI.2017.8126007 Sudiarto Raharjo, W., E.K. Ratri, I. D., & Susilo, H. (2017). Implementasi Two
Factor Authentication Dan Protokol Zero Knowledge Proof Pada Sistem Login.
Jurnal Teknik Informatika Dan Sistem Informasi, 3(1), 127–136.
https://doi.org/10.28932/jutisi.v3i1.579
Taufik Ramadhany, (2016). Authentication, K. M., & Hmac, C. (n.d.). Keyed-hash Message Authentication Code ( HMAC ).
Ungkawa, U., Dewi, I. A., & Putra, K. R. (2013). Implementasi Algoritma Time- Based One Time Password Dalam Otentikasi Token Internet Banking. Teknik Informatika Fakultas Teknologi Industri Institut Teknologi Nasional Bandung, 2–11.