Claim Missing Document
Check
Articles

Found 7 Documents
Search

Secured and Auditable Cryptography for Electronic Voting Zulkarnaim Masyhur; Firmansyah Ibrahim; Asep Indra Syahyadi
Jurnal INSYPRO (Information System and Processing) Vol 5 No 2 (2020)
Publisher : Prodi Sistem Informasi UIN Alauddin

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (339.636 KB) | DOI: 10.24252/insypro.v5i2.17797

Abstract

Dengan adanya Electronic Voting (e-voting) diharapkan dapat menggantikan sistem pemungutan suara konvensional yang telah ada sebelumnya. Pada sistem e-voting ini menggunakan konsep Pret a Voter yang menggunakan skema paper ballot e-voting. Skema ini menggunakan Public Key Infrastructure (PKI). Skema yang diusulkan menggunakan paper ballot e-voting dengan pertimbangan telah popular di kalangan masyarakat, tetapi didukung oleh protokol enkripsi yang kuat untuk menjamin vote secrecy dan anonymity dari pemilih. Aspek verifiability dari suatu system e-voting juga merupakan hal fundamental. Sistem e-voting menggunakan system protocol mixnets dengan kompleksitas security cukup baik. 
Sistem Informasi Pengenalan Tanaman Menggunakan QR Code Scanner Firmansyah Ibrahim; Zulkarnaim Masyhur; Khaerunsituncu Khaerunsituncu
Journal Software, Hardware and Information Technology Vol 1 No 1 (2021)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v1i1.4

Abstract

There are many different kinds of plants that can be found anywhere, but we don't know precisely what types and uses they are, so it's good for us to understand these plants. The purpose of this research is to make it easier to find out about plants by designing and building an information system about plant qualifications using QR Code technology combined with the Website application. This type of research used in this research is a qualitative method. Qualitative methods are research methods that are descriptive and tend to use analysis. Process and meaning (subject perspective) are emphasized more in qualitative methods. While the data collection methods used were observation, interviews and literature study. The application planning method used is a waterfall. In contrast, the testing technique used by the author is Black Box testing. The results of this research are in the form of a web-based plant recognition information system to make it easier for administrators to provide information and make it easier for visitors to get plant information. Based on the test results, it can be concluded that this system is running according to the common objectives.
Studi Literatur Keamanan dan Privasi Data Sistem Cloud Computing Pada Platform Google Drive Zulkarnaim Masyhur; Adhy Rizaldy; Patmayanti Kartini
Journal Software, Hardware and Information Technology Vol 1 No 2 (2021)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v1i2.15

Abstract

In today's era, we can do mobilization activities anytime and anywhere. Especially with the cloud computing system that makes it easy to interact from one computer to another without consuming a lot of money. This allows us to access data and information from computers or accounts that are connected. Google Drive is a data storage and synchronization service provided by Google. Where every user can use cloud computing in the form of file sharing and editing collaboration. The purpose of this paper is to find out how the challenges and solutions for data security and user privacy are on the Google Drive platform.
Internet of Things (IoT): Security, Threats and Countermeasures Zulkarnaim Masyhur; Firmansyah Ibrahim; Didit Hermawan
Journal Software, Hardware and Information Technology Vol 2 No 2 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i2.31

Abstract

Internet of Things (IoT) is a technology that is very popular lately and is starting to get busy in Indonesia, marked by various cellphone manufacturers building an IoT ecosystem. IoT can help connect objects such as sensors, vehicles, hospital instruments, household appliances and others. However, connecting these smart devices to the internet network causes various data security problems because internet technology and communication protocols have not been specifically designed to support IoT devices. The leakage of data security through the commercialization of IoT devices, causes privacy problems, threats of cyber-attacks, and organized crime. This paper aims to educate about how data security attacks in IoT and how to overcome them. To achieve this goal, we first discuss various well-known IoT reference models and define security in the context of IoT. Second, identify and classify various IoT attacks and threats. Third, described methods of countermeasures against IoT attacks. In the end, it provides some tips on securing IoT devices.
Design dan Implementasi Verifikasi Pada Single Ballot E-Voting Zulkarnaim Masyhur; Asep Indra Syahyadi
Indonesian Journal of Fundamental Sciences Vol 6, No 2 (2020)
Publisher : Universitas Negeri Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (571.342 KB) | DOI: 10.26858/ijfs.v6i2.16880

Abstract

Sistem electronic voting telah banyak digunakan negara-negara di dunia dengan tujuan untuk efektifitas dan efesiensi waktu dan biaya. Akan tetapi, keamanan dari sistem e-voting harus mendapat perhatian khusus untuk menghindari kecurangan dan hilangnya kepercayaan dari kandidat dan pemilih. Pada penelitian ini akan difokuskan pada peningkatan aspek verifiability dari sistem e-voting sehingga tingkat kepercayaan dan keabsahan dari pemilih dan kandidat dapat tercapai terhadap proses maupun hasil dari pemilihan umum. Aspek-aspek verifiability mencakup Individual verifiability, universal verifiability dan eligibility verifiability ditonjolkan dalam perancangan dan implementasi penelitian ini. Ini juga bertujuan untuk memungkinkan pemilih, pihak penyelengara pemilihan maupun pemantau dapat melakukan verifikasi dan melakukan pengecekan terhadap dari data pemilihan. Dari pengujian dan implementasi, sistem ini dirancang dengan tujuan dapat dilakukan proses verifikasi tetapi tidak menghilangkan aspek anonymity menggunakan public key infrastructure dan hash function.
Security and Data Integrity Analysis in E-Voting Systems Zulkarnaim Masyhur; Nahrun Hartono
Jurnal INSYPRO (Information System and Processing) Vol 8 No 1 (2023)
Publisher : Prodi Sistem Informasi UIN Alauddin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/insypro.v8i1.37858

Abstract

Optimizing transaction data performance in database management systems Nahrun Hartono; Zulkarnaim Masyhur
Matrix : Jurnal Manajemen Teknologi dan Informatika Vol. 13 No. 2 (2023): Jurnal Manajemen Teknologi dan Informatika
Publisher : Unit Publikasi Ilmiah, P3M, Politeknik Negeri Bali

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31940/matrix.v13i2.106-114

Abstract

One indicator of the quality of an information system is the speed of data processing. A database's most common data processing operations are adding, displaying, changing, and deleting data. The amount of data stored in the database significantly impacts the performance of data processing and, therefore, the performance of information systems. The update command changes some or all of the data in a table. The update command works by retrieving the data in the table to be changed, entering the new data in a form, and then sending it back to the database. The update command is often combined with a condition specifying which data rows must be changed. This research is an experimental study that compares the use of the update command with a stored procedure to the use of the update command without a stored procedure. The results showed that the average processing time for the update command with the stored procedure was 348.896 milliseconds for the minimum data category, 266.462 milliseconds for the medium data category, and 279.543 milliseconds for the maximum data category. The average processing time for the update command without a stored procedure was 297.132 milliseconds for the minimum data category, 747.670 milliseconds for the medium data category, and 1256.273 milliseconds for the maximum data category. These results suggest that the update command with a stored procedure is more efficient than the one without a stored procedure. This is because the stored procedure can pre-compile the SQL statement, which reduces the time it takes to execute the statement.