Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Daniel Adrianto"'
Autor:
Daniel Adrianto Widyopratomo, 魏丹尼
103
Security is one of the fundamental aspects one needs to carefully design and implement for IoT systems. Fortunately, ETSI, as a standard body in telecommunication industry, has defined a comprehensive set of common security mechanisms to pro
Security is one of the fundamental aspects one needs to carefully design and implement for IoT systems. Fortunately, ETSI, as a standard body in telecommunication industry, has defined a comprehensive set of common security mechanisms to pro
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/93038423754970301425
Publikováno v:
AIP Conference Proceedings; 2023, Vol. 2741 Issue 1, p1-11, 11p
Publikováno v:
2021 International Conference on Green Energy, Computing and Sustainable Technology (GECOST).
A Covid-19 vaccine is so highly anticipated with the global pandemic status arise. Hence, distributing the vaccine is a challenging task, especially for an archipelago country like Indonesia. Until now, the vaccine distribution is an offline-based sy
Autor:
Daniel Adrianto, Raihan Zaky Thamrin, I Ketut Agung Enriko, Octarina Nur Samijayani, Suci Rahmatia
Publikováno v:
2020 IEEE International Conference on Communication, Networks and Satellite (Comnetsat).
In LoRa network architecture, the End Device functions as a node that is connected to sensors and other interfaces which then transmit data to the gateway, and to be forwarded to the Network Server. This paper implement LoRa on a sensor network, cons
Publikováno v:
IoTaIS
Manufacturing industries, such as pharmaceutical, use machines from many vendors to manufacture products. Different machines use different protocols and have different tools to configure and to monitor it. However, in spite of having machine-specific
Autor:
Daniel Adrianto, Fuchun Joseph Lin
Publikováno v:
WF-IoT
ETSI, as a standard body in telecommunication industry, has defined a comprehensive set of common security mechanisms to protect the IoT/M2M system. They are Service Bootstrapping, Service Connection, and mId Security. For each mechanism, there are s