Amang Sudarsono

Orcid: 0000-0002-0751-7948

According to our database1, Amang Sudarsono authored at least 18 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Ephemeral Secret Leakage-Free ID-Role-Based Access Control Authentication and Key Exchange Protocol for Securing Electric Vehicle Data.
IEEE Access, 2024

2023
An Anonymous Authentication With Received Signal Strength Based Pseudonymous Identities Generation for VANETs.
IEEE Access, 2023

2020
A Weighted Geometric Dilution of Precision-Based Method for Indoor Positioning System.
J. Commun., 2020

Design and Implementation of Hypothermia Symptoms Early Detection With Smart Jacket Based on Wireless Body Area Network.
IEEE Access, 2020

2018
An Implementation of Shared Key Generation Extracted from Received Signal Strength in Vehicular Ad-Hoc Communication.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

2017
A Secure Data Exchange System in Wireless Delay Tolerant Network Using Attribute-Based Encryption.
J. Inf. Process., 2017

2016
Portable electrocardiogram sensor monitoring system based on Body Area Network.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2016

2015
Monitoring system of patient position based on wireless body area sensor network.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

An implementation of secure data sensor transmission in Wireless Sensor Network for monitoring environmental health.
Proceedings of the 2015 International Conference on Computer, 2015

Guaranteed Time Slot allocation method for IEEE 802.15.4 Wireless Sensor Network.
Proceedings of the 2015 International Conference on Computer, 2015

An Implementation of Secure Data Exchange System with Multi-hop Routing in Wireless Delay Tolerant Network Using Attribute-Based Encryption.
Proceedings of the Third International Symposium on Computing and Networking, 2015

2014
An implementation of secure wireless sensor network for e-healthcare system.
Proceedings of the 2014 International Conference on Computer, 2014

Analysis of slotted and unslotted CSMA/CA Wireless Sensor Network for E-healthcare system.
Proceedings of the 2014 International Conference on Computer, 2014

An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption.
Proceedings of the Second International Symposium on Computing and Networking, 2014

2013
PEGAS: Partitioned GTS allocation scheme for IEEE 802.15.4 networks.
Proceedings of the 2013 International Conference on Computer, 2013

2012
A Pairing-Based Anonymous Credential System with Efficient Attribute Proofs.
J. Inf. Process., 2012

2011
Efficient Proofs of Attributes in Pairing-Based Anonymous Credential System.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

2010
Anonymous IEEE802.1X Authentication System Using Group Signatures.
J. Inf. Process., 2010


  Loading...