{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T05:36:48Z","timestamp":1744695408414,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/icacci.2013.6637420","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T19:21:09Z","timestamp":1383074469000},"page":"1604-1608","source":"Crossref","is-referenced-by-count":12,"title":["Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS"],"prefix":"10.1109","author":[{"given":"Eko","family":"Sediyono","sequence":"first","affiliation":[]},{"given":"Kartika Imam","family":"Santoso","sequence":"additional","affiliation":[]},{"family":"Suhartono","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"volume-title":"Wikipedia, 2013, One-time Password, Wikipedia, the free encyclopedia","year":"2013","key":"ref1"},{"volume-title":"A One-Time Password Authentication Method","year":"2003","author":"Takasuke","key":"ref2"},{"issue":"2","key":"ref3","first-page":"133","article-title":"Eliminating Vulnerable Attacks Using One-Time Password and PassText - Analytical Study of Blended Schema","volume":"1","author":"Viju","year":"2010","journal-title":"Universal Journal of Computer Science and Engineering Technology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2009.5069395"},{"issue":"9","key":"ref5","first-page":"569","article-title":"Authentication Using Mobile Phone as a Security Token","volume-title":"IJCSET","volume":"1","author":"Rao"},{"volume-title":"Computer Security","year":"2006","author":"Ariyus","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79698-5"},{"volume-title":"The Implementation of One Time Password on a Login Authentication SMS","year":"2012","author":"Akbar","key":"ref8"},{"volume-title":"Kriptography","year":"2006","author":"Munir","key":"ref9"},{"volume-title":"SMS Gateway Using Gammu and MySQL","year":"2012","author":"Acho","key":"ref10"},{"volume-title":"Fundamentals of Computer Security","year":"2011","author":"Easttom","key":"ref11"},{"volume-title":"Cryptanalytic Attacks on Pseudorandom Number Generators","year":"2009","author":"John","key":"ref12"},{"volume-title":"Design and Development of One Time Password Authentication Software using J2ME Technology, Tesis","year":"2010","author":"Lazuardi","key":"ref13"},{"issue":"1","key":"ref14","first-page":"131","article-title":"Secure Multimodal Mobile Authentication Using One Time Password","volume":"1","author":"Mohan","year":"2012","journal-title":"International Journal of Recent Technology and Engineering (IJRTE)"},{"volume-title":"Analysis and Design of Information System Using Object Oriented Methodology","year":"2002","author":"Nugroho","key":"ref15"},{"issue":"4","key":"ref16","article-title":"SET with SMS OTP using Two Factor Authentication","volume":"4","author":"Parameswari","year":"2011","journal-title":"International Journal of Computer Applications Volume"},{"volume-title":"Software Engineering","year":"2002","author":"Pressman","key":"ref17"},{"key":"ref18","first-page":"175","article-title":"The Analysis of Web Based Academic Information System in Technics Faculty of Diponegoro State University","volume-title":"Proceeding of National Seminar on Science and technology Application","author":"Satoto"},{"volume-title":"Computer System Security","year":"2006","author":"Simarmata","key":"ref19"},{"issue":"1","key":"ref20","first-page":"22","article-title":"Cryptography Application Using Message Digest 5 (MD5) Algorithm","volume":"11","author":"Sofwan","year":"2006","journal-title":"Transmisi"},{"volume-title":"Cryptography and Network Security Principles and Practices","year":"2005","author":"Stalling","key":"ref21"},{"volume-title":"Modified Authentication Using One-Time Password to Support Web Services Security","year":"2008","author":"Yuliyanti","key":"ref22"},{"volume-title":"Infiltrate the Computer Security","year":"2008","author":"Zam","key":"ref23"}],"event":{"name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2013,8,22]]},"location":"Mysore","end":{"date-parts":[[2013,8,25]]}},"container-title":["2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621059\/6637135\/06637420.pdf?arnumber=6637420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T18:01:19Z","timestamp":1706032879000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6637420\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icacci.2013.6637420","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}