Search

Your search keyword '"Amang Sudarsono"' showing total 40 results

Search Constraints

Start Over You searched for: Author "Amang Sudarsono" Remove constraint Author: "Amang Sudarsono" Topic computer network Remove constraint Topic: computer network
40 results on '"Amang Sudarsono"'

Search Results

1. Higher Rate Secret Key Formation (HRKF) based on Physical Layer for Securing Vehicle-to-Vehicle Communication

2. Analysis of Key Generation Which Extracted from RSS for Handover System in V2I Communication

3. An Implementation of Secure Vehicle-to-Vehicle Communication Using Shared Key Generation with Kano Method

4. Trusted Data Transmission Using Data Scrambling Security Method with Asymmetric Key Algorithm for Synchronization

5. RSS-based Secret Key Establishment using Middle-Point Quantization and Clover Filter Algorithm

6. Secure Communication System of Drone Service using Hybrid Cryptography over 4G/LTE Network

7. An Implementation of Efficient Group Signature for Anonymous Authentication System in Vehicular Ad-Hoc Networks

8. A Secure Data Exchange System in Wireless Delay Tolerant Network Using Attribute-Based Encryption

9. Smart Environment: Accuracy of a server side model in design topology WSN and IoT

10. An Implementation of Secure Monitoring System to Track Member in A Tour Group Using Group Signature

11. An Implementation of Shared Key Generation Extracted from Received Signal Strength in Vehicular Ad-Hoc Communication

12. A Reciprocity Approach for Shared Secret Key Generation Extracted from Received Signal Strength in The Wireless Networks

13. MAPI: Key Generation Scheme for Security in V2V Communication Environment based RSS

14. Partition-Based GTS Adjustment for Wireless Sensor Networks

15. Skema Lokalisasi Posisi Node Terdistribusi pada Lingkungan Free Space Path Loss

16. Asymmetric cryptography for synchronization on MIMO-OFDM system

17. Secure data transmission scheme for indoor mobile cooperative localization system

18. Secure data sensor access using attribute-based encryption with revocation for environmental monitoring

19. Performance analysis of OLSR Routing for secure medical data transmission for rural areas with Delay Tolerant Network

20. SCLoc: Secure localization platform for indoor wireless sensor network

21. An implementation of anonymous authentication system in wireless sensor network using vlr group signature

22. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

23. An anonymous authentication system in wireless networks using verifier-local revocation group signature scheme

24. SECURE DATA SENSOR SHARING ON UBIQUITOUS ENVIRONMENTAL HEALTH MONITORING APPLICATION

25. Covert Communication in MIMO-OFDM System Using Pseudo Random Location of Fake Subcarriers

26. Traffic Analysis of Quality of Service (QoS) for Video Conferencing between Main Campus and Sub Campus in Laboratory Scale

27. Performance Analysis of DTN Using Level Signal Priority Epidemic Routing Protocol

28. An Implementation of Secure Data Exchange System with Multi-hop Routing in Wireless Delay Tolerant Network Using Attribute-Based Encryption

29. Guaranteed Time Slot allocation method for IEEE 802.15.4 Wireless Sensor Network

30. An implementation of secure data sensor transmission in Wireless Sensor Network for monitoring environmental health

31. Anonymous IEEE802.1X Authentication System Using Group Signatures

32. Secure data exchange using authenticated Ciphertext-Policy Attributed-Based Encryption

33. Reliability analysis of GSM network using Software Defined Radio-based system

34. Modified GTS Allocation Scheme for IEEE 802.15.4

35. An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption

36. An implementation of secure wireless sensor network for e-healthcare system

37. Analysis of slotted and unslotted CSMA/CA Wireless Sensor Network for E-healthcare system

38. Secure Data Sensor In Environmental Monitoring System Using Attribute-Based Encryption With Revocation

39. PEGAS: Partitioned GTS allocation scheme for IEEE 802.15.4 networks

Catalog

Books, media, physical & digital resources