Amang Sudarsono
Orcid: 0000-0002-0751-7948
According to our database1,
Amang Sudarsono
authored at least 18 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Ephemeral Secret Leakage-Free ID-Role-Based Access Control Authentication and Key Exchange Protocol for Securing Electric Vehicle Data.
IEEE Access, 2024
2023
An Anonymous Authentication With Received Signal Strength Based Pseudonymous Identities Generation for VANETs.
IEEE Access, 2023
2020
A Weighted Geometric Dilution of Precision-Based Method for Indoor Positioning System.
J. Commun., 2020
Design and Implementation of Hypothermia Symptoms Early Detection With Smart Jacket Based on Wireless Body Area Network.
IEEE Access, 2020
2018
An Implementation of Shared Key Generation Extracted from Received Signal Strength in Vehicular Ad-Hoc Communication.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
2017
A Secure Data Exchange System in Wireless Delay Tolerant Network Using Attribute-Based Encryption.
J. Inf. Process., 2017
2016
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2016
2015
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015
An implementation of secure data sensor transmission in Wireless Sensor Network for monitoring environmental health.
Proceedings of the 2015 International Conference on Computer, 2015
Proceedings of the 2015 International Conference on Computer, 2015
An Implementation of Secure Data Exchange System with Multi-hop Routing in Wireless Delay Tolerant Network Using Attribute-Based Encryption.
Proceedings of the Third International Symposium on Computing and Networking, 2015
2014
Proceedings of the 2014 International Conference on Computer, 2014
Analysis of slotted and unslotted CSMA/CA Wireless Sensor Network for E-healthcare system.
Proceedings of the 2014 International Conference on Computer, 2014
An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption.
Proceedings of the Second International Symposium on Computing and Networking, 2014
2013
Proceedings of the 2013 International Conference on Computer, 2013
2012
J. Inf. Process., 2012
2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
2010
J. Inf. Process., 2010