Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 8
Page No. 2209 - 2220

Implementation of Two-Factor Authentication (2FA) to Enhance the Security of Academic Information System

Authors : Gigih Forda Nama and Kurnia Muludi

References

Bamberger, W., O. Welter and S. Spitz, 2007. Mobile phones as secure gateways for message-based ubiquitous communication. Proceedings of the 1st International Workshop on Information Security Theory and Practices, May 9-11, 2007, Springer, Heraklion, Greece, pp: 175-188.

Cristofaro, E.D., H. Du, J. Freudiger and G. Norcie, 2014. A comparative usability study of two-factor authentication. Proceedings of the 2014 International Workshop on National Diabetes Surveillance System (NDSS’14), February 23, 2014, Catamaran Resort Hotel and Spa, San Diego, California, USA., ISBN:1-891562-37-1, pp: 1-10.

Gholami, M., S.M. Hashemi and M. Teshnelab, 2007. A Framework for Secure Message Transmission Using SMS-Based VPN. In: Research and Practical Issues of Enterprise Information Systems II, Xu, L.D., A.M. Tjoa and S.S. Chaudhry (Eds.). Springer, Boston, Massachusetts, ISBN:978-1-4757-0563-8, pp: 503-511.

Josang, A., C. Rosenberger, L. Miralabe, H. Klevjer and K.A. Varmedal et al., 2015. Local user-centric identity management. J. Trust Manage., Vol. 2,

Josefsson, S., 2011. Password-Based Key Derivation Function 2 (PBKDF2) test vectors. Internet Eng. Task Force, 1: 1-5.
Direct Link  |  

Modrek, S., E. Schatzkin, A. De La Cruz, C. Isiguzo and E. Nwokolo et al., 2014. SMS messages increase adherence to rapid diagnostic test results among Malaria patients: Results from a pilot study in Nigeria. Malar. J., Vol. 13,

Moore, S.C., K. Crompton, S. Goozen, M. Bree and J. Bunney et al., 2013. A feasibility study of short message service text messaging as a surveillance tool for alcohol consumption and vehicle for interventions in university students. BMC. Public Health, Vol. 13,

Mulliner, C., R. Borgaonkar, P. Stewin and J.P. Seifert, 2013. SMS-Based One-Time Passwords: Attacks and Defense. In: Detection of Intrusions and Malware and Vulnerability Assessment, Rieck, K., P. Stewin and J.P. Seifert (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-39234-4, pp: 150-159.

Nagaraju, S. and L. Parthiban, 2015. Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway. J. Cloud Comput., Vol. 4,

Nama, G.F., M. Komarudin and H.D. Septama, 2015. Performance analysis of Aruba™ wireless local area network Lampung University. Proceedings of the International Conference on Science in Information Technology (ICSITech), October 27-28, 2015, IEEE, Yogyakarta, Indonesia, ISBN:978-1-4799-8384-1, pp: 41-46.

Nama, G.F., M. Komarudin, P.H. Mardiana and H.D. Septama, 2014. Electricity, temperature and network utilization monitoring at Lampung University data centre using low cost low power single board mini computer. Proceedings of the Regional Conference on Computer Information Engineering, October 7-8, 2014, Eastparc Hotel, Yogyakarta, Indonesia, pp: 184-189.

Nama, G.F., M. Ulvan, A. Ulvan and A.M. Hanafi, 2015. Design and implementation web based geographic information system for public services in Bandar Lampung City: Indonesia. Proceedings of the International Conference on Science in Information Technology (ICSITech), October 27-28, 2015, IEEE, Yogyakarta, Indonesia, ISBN:978-1-4799-8384-1, pp: 270-275.

Nglazi, M.D., L.G. Bekker, R. Wood, G.D. Hussey and C.S. Wiysonge, 2013. Mobile phone text messaging for promoting adherence to anti-tuberculosis treatment: A systematic review protocol. Syst. Rev., Vol. 2,

Parameswari, D. and L. Jose, 2011. SET with SMS OTP using two factor authentication. J. Comput. Appl., 4: 109-112.

Raddum, H., L.H. Nestas and K.J. Hole, 2010. Security analysis of mobile phones used as OTP generators. Proceedings of the 4th International Workshop on Information Security Theory and Practices (WISTP’10), April 12-14, 2010, Springer, Passau, Germany, pp: 324-331.

Septama, H.D., A. Ulvan, G.F. Nama, M. Ulvan and R. Bestak, 2015. Dynamic tunnel switching using network functions visualization for HA system failover. Proceedings of the 2015 International Conference on Science in Information Technology (ICSITech’15), October 27-28, 2015, IEEE, Yogyakarta, Indonesia, ISBN:978-1-4799-8384-1, pp: 259-263.

Stallings, W. and L. Brown, 2012. Computer Security: Principles and Practice. 2nd Edn., Pearson Education, Upper Saddle River, New Jersey, ISBN:9780133072631, Pages: 816.

Vapen, A. and N. Shahmehri, 2010. Security levels for web authentication using mobile phones. Proceedings of the 2010 Prime Life International Summer School on Privacy and Identity Management for Life, August 2-6, 2010, Springer, Helsingborg, Sweden, pp: 130-143.

Zhao, J., W. Li, Y. Yang, H. Meng and W. Huang, 2010. Design and Realization of Information Service System of Agricultural Expert Based on Wireless Mobile Communication Technology. In: Computer and Computing Technologies in Agriculture, Li, D., Y. Liu and Y. Chen (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-18353-9, pp: 598-603.

Design and power by Medwell Web Development Team. © Medwell Publishing 2023 All Rights Reserved