Zobrazeno 1 - 10
of 72
pro vyhledávání: '"Mike Yuliana"'
Publikováno v:
IEEE Access, Vol 12, Pp 120961-120978 (2024)
Role-based Access Control (RBAC) promises an efficient authorization management system in accessing resources including electric vehicle (EV) data stored in the cloud server. In this EV data security implementation, access control has to be strong an
Externí odkaz:
https://doaj.org/article/c4d5957fb5204d429af62e277589b6d1
Autor:
Amang Sudarsono, Mike Yuliana
Publikováno v:
IEEE Access, Vol 11, Pp 15637-15654 (2023)
Anonymous authentication system enables mobile users to anonymously authenticate themselves to an authorized entity such as a Group Manager (GM) without revealing any privacy information. It provides unlinkable but accountable communications as well.
Externí odkaz:
https://doaj.org/article/7902d0e4bf5645ddb851cbd582b9d449
Publikováno v:
Jurnal Komputer Terapan, Vol 8, Iss 1 (2022)
In wireless communications such as LoRa, it is necessary key generation to secure data. It is intended that the data sent is not easily attacked by attackers. One way to obtain a secure key is a high RSSI correlation coefficient value. In this resear
Externí odkaz:
https://doaj.org/article/1fdd27bce0f14469b4c422b305f8505b
Publikováno v:
Jurnal Elkomika, Vol 10, Iss 1 (2022)
ABSTRAK Untuk menghindari pihak ketiga yang tidak berwenang, berbagai solusi keamanan telah dibuat untuk mengamankan kerahasiaan pesan atau informasi, salah satunya adalah steganografi. Penelitian ini mengusulkan teknik pembangkitan kunci dalam pros
Externí odkaz:
https://doaj.org/article/9966f4ec208549ca85b05d6262837c02
Publikováno v:
Emitter: International Journal of Engineering Technology, Vol 8, Iss 1 (2020)
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic scheme that requires the distribution of shared secret keys. To reduce attacks on key distribution, physical layer-based key formation schemes that util
Externí odkaz:
https://doaj.org/article/0ebe98be758140f5854a21df5cf09a4a
Implementasi Sistem Notifikasi untuk Pengawasan Pasien Alzheimer Berbasis Bluetooth Low Energy (BLE)
Autor:
Aries Pratiarso, Trisna Agung Mahendra, Mike Yuliana, Prima Kristalina, I Gede Puja Astawa, Arifin
Publikováno v:
Jurnal Nasional Teknik Elektro dan Teknologi Informasi, Vol 7, Iss 4, Pp 411-417 (2018)
Pasien Alzheimer merupakan pasien yang memerlukan perhatian dan perawatan khusus dikarenakan ketidakmampuannya dalam mengingat sesuatu. Salah satu teknologi yang sering digunakan untuk tracking objek atau orang dalam ruangan adalah Bluetooth Low Ener
Externí odkaz:
https://doaj.org/article/afb8980c5bf043a5ac71d46d8d84acaf
Publikováno v:
Jurnal Nasional Teknik Elektro dan Teknologi Informasi, Vol 6, Iss 3, Pp 284-290 (2017)
Externí odkaz:
https://doaj.org/article/daef1820ea1e4071931a6eb34d980934
Autor:
Aries Pratiarso, Adam Surya Putra, Prima Kristalina, Amang Sudarsono, Mike Yuliana, I Gede Puja Astawa
Publikováno v:
Jurnal Nasional Teknik Elektro dan Teknologi Informasi, Vol 6, Iss 3, Pp 352-358 (2017)
A wireless sensor network consists of interconnected nodes that exchange information and use shared resource in a wireless transmission medium. Sensor nodes are randomly deployed in observation area in static or moving term. During this situation, th
Externí odkaz:
https://doaj.org/article/a993e552d76543c9a1773585e638e337
Autor:
Prima Kristalina, Florista Dewi, Mike Yuliana, Tri Budi Santoso, Amang Sudarsono, Reni Soelistijorini
Publikováno v:
Jurnal Nasional Teknik Elektro dan Teknologi Informasi, Vol 7, Iss 3 (2018)
Secret key generation scheme that utilizes the randomness of wireless channels is a very promising alternative to establish a secure communication path. Some wireless devices are used to obtain the channel parameters. But the problem that occurs is i
Externí odkaz:
https://doaj.org/article/ac97680d4f4e4a25a60fda8d7c17dac0
Publikováno v:
Sensors, Vol 19, Iss 12, p 2674 (2019)
One solution to ensure secrecy in the Internet of Things (IoT) is cryptography. However, classical cryptographic systems require high computational complexity that is not appropriate for IoT devices with restricted computing resources, energy, and me
Externí odkaz:
https://doaj.org/article/9b15aa711d1c4111ba26d449b751ddc5