Amang Sudarsono at Electronics Engineering Polytechnic Institute of Surabaya (EEPIS) - ITS, Indonesia

Amang Sudarsono

Division of Telecommunication Engineering, Dept. of Electrical Engineering,
Electronics Engineering Polytechnic Institute of Surabaya (EEPIS),
Kampus ITS Sukolilo, Surabaya 60111, Indonesia, Tel:+6231 594 7280; Fax:+6231 594 6114
E-mail: amang@pens.ac.id

I was in the Graduate School of Natural Science and Technology (GNST), Okayama University, Japan; Graduate School of Information Sciences (GSIS), Tohoku University, Japan; and Sepuluh Nopember Institute of Technology (ITS) Surabaya, Indonesia, respectively. I also was a Network Engineer in the Division of Network Engineering, Metro Cellular Nusantara, Ltd., Surabaya, Indonesia.

My research interests include privacy-enhancing authentications (group signatures), network & information security, and cryptography as well. Currently, we are working on designing privacy preserving for anonymous authentication and its applications in wireless networks.

A Privacy Protection for Member in a Legitimated Group Monitoring System
Applied for: Secure monitoring system of member(s) in a group.

By using a group signature scheme and other cryptographic schemes, we are developing a secure tracking and monitoring system of member(s) in a group, such as a tour group without revealing their private information, such as full name, email address, birth of date, etc. Through this secure system, only members on the group are able to valid update their current position and view other members' position without knowing the private information of members.

Secure Routing Protocol on Wireless Networks
Applied for: Wireless networks, wireless sensor networks, wireless delay tolerant networks.

Shared symmetric key derived from information of wireless channel among participating nodes can be used for any symmetric cryptosystem to ensure the confidentiality of routing information among such communicating nodes as well. However, public key cryptography may also be used to secure routing information among nodes. In this project, we employed Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Identity Based-Encryption (IBE), and Group Signature.

Shared Symmetric Key Generator from Wireless Channel Information
Applied for: Secure vehicular communication.

Synchronization shared symmetric key among vehiculars in the vehicular networks could be established by extracting the symmetric information of wireless channel such as Received Signal Strength (RSS), Channel State Information (CSI), Channel Impulse Response (CIR), or miscellaneous between two legitimated vehiculars. Then, by utilizing any symmetric cryptosystem, the confidentiality of data exchanges can be maintained.

An Environmental Health Monitoring System through Wireless Sensor Network as a Part of Smart Cities Support
Applied for: Environmental health monitoring system and e-healthcare.

Disseminating latest sensory information of environmental health is one of very important circumstances for everyone. These circumstances should be accessible at anytime and anywhere by everyone. Wireless Sensor Network (WSN) is one of the networks which deals with data sensors distributions from sensor nodes to the gateway node toward a Data Center Server. In this work, we implement an environmental health conditions monitoring system through WSN. In our system, we collect some environmental health information such as temperature, humidity, luminosity, noise, carbon monoxide (CO) and carbon dioxide (CO2) from sensor nodes. The transmitted data sensors are propagated through IEEE802.15.4-based communication toward a gateway which equipped with a small-size storage. Further, the collected data sensors in the gateway are synchronized to the Data Center Server through TCP/IP connection for permanently storing. At anytime and anywhere, all legitimated users are able to access the data sensors through web-based and/or mobile applications from their end devices (e.g., Desktop PCs, Laptop PCs, and Smartphones).

Efficient Proofs of Attributes in Anonymous Credential Systems Using a Pairing-Based Accumulator
Applied for: An Electronic Identity Card (eID).

Anonymous credential system allows the user to convince a verifier of the possession of a certificate issued by an issuer anonymously. A previously proposed system achieves the constant complexity for the number of attributes. However, due to the use of RSA-based cryptography, it still suffers from a high cost computation. In this work, we propose an anonymous credential system with the constant complexity using a pairing-based accumulator and show the practicality of the system in an on-line electronic identity card (eID) application.

An Anonymous On-Demand Routing Protocol Using Pairing-Based Group Signatures
Applied for: An Anonymous Routing Protocol for Mobile Ad-Hoc Networks (MANETs).

Naturally, the communications in the mobile ad-hoc networks (MANETs) are more easily observed for the goal of the network traffic analysis. Hence, to enable anonymous communications from thwarting of such analysis attacks would be strongly desirable. In this work, we introduce an anonymous on-demand routing protocol using pairing-based group signatures. In this protocol, the anonymous communications are achieved by allowing all nodes as valid members of a privilege group to authenticate each other without revealing their own identities throughout an anonymous neighborhood authentication protocol.

A Group Signature Scheme with Efficient Verifier-Local Revocation Check
Applied for: An Anonymous Authentication for On-line Transaction in Mobile Applications.

Recently, verifier-local revocation (VLR) group signature scheme is one of schemes suitable for mobile signers. Unfortunately, the verifier needs to compute R separated pairings for revocation check, where R denotes the number of revoked members. In this work, we propose a VLR group signature scheme with efficient verifier-local revocation check. The efficiency improvement is derived from the observation that the product of pairings can be computed faster than the separated pairings.

Anonymous IEEE802.1X Authentication System Using Group Signatures
Applied for: An Anonymous Authentication for Wireless-ISPs.

Recently, ubiquitous Internet-access services have been provided by Internet service providers (ISPs) by deploying wireless local area networks (LANs) in public spaces including stations, hotels, and coffee shops. The IEEE802.1X protocol is usually used for user authentications to allow only authorized users to access services. Then, although user personal information of access locations, services, and operations can be easily collected by ISPs and thus, their strict management has been demanded, it becomes very difficult when multiple ISPs provide roaming services by their corporations. In this work, we present an anonymous IEEE802.1X authentication system using a group signature scheme to allow user authentication without revealing their identities. Without user identities, ISPs cannot collect personal information. As an efficient revocable group signature scheme, we adopt the verifier-local revocation (VLR) type with some modifications for use of the fast pairing computation. We show the implementation of our proposal and evaluation results where the practicality of our system is confirmed for up to 1,000 revoked users.

A Study of Pairing-Based Anonymous Authentication Systems and Their Applications.
In Japanese: ペアリングを用いた匿名認証システムとその応用に関する研究。
Read Phonetically: Pea ringu o mochiita tokumei ninshō shisutemu to sono ōyō ni kansuru kenkyū.
Graduate School of Natural Science and Technology, Okayama University, Japan, March, 2011.
[pdf file]

Journals:
47
M. Udin Harun Al Rasyid, Sritrusta Sukaridhoto, Amang Sudarsono, and Afdolash Nur Kaffah, “Design and Implementation of Hypothermia Symptoms Early Detection With Smart Jacket Based on Wireless Body Area Network”, IEEE Access ( Volume: 8), ISSN: 2169-3536, pp. 155260-155274, 2020. [full paper]
46
Agostinho Marques Ximenes, Sritrusta Sukaridhoto, Amang Sudarsono, and Hasan Basri, “Analisys and Implementation Cloud-based Biometricauthentication in Mobile Platform”, Jurnal Ilmiah Kursor, Vol. 10, No. 2, ISSN 2301-6914, 2020. [full paper]
45
Inka Trisna Dewi, Amang Sudarsono, Prima Kristalina, and Mike Yuliana, “Higher Rate Secret Key Formation (HRKF) based on Physical Layer for Securing Vehicle-to-Vehicle Communication”, EMITTER International Journal of Engineering Technology, ISSN: 2355-391X, Online ISSN: 2443-1168, Vol. 8, No. 1, pp. 140-160, 2020. [full paper]
44
Anindya Dwi Putri Islamidina, Amang Sudarsono, and Titon Dutono, “Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection”, EMITTER International Journal of Engineering Technology, ISSN: 2355-391X, Online ISSN: 2443-1168, Vol. 8, No. 1, pp. 102-125, 2020. [full paper]
43
Afifah Dwi Ramadhani, Prima Kristalina, and Amang Sudarsono, “A Weighted Geometric Dilution of Precision-Based Method for Indoor Positioning System”, Journal of Communications (JOCM), ISSN: 1796-2021, Vol. 15, No. 1, pp. 65-73, Jan., 2020. [full paper]
42
Dian Neipa Purnamasari, Amang Sudarsono, and Prima Kristalina, “Medical Image Encryption Using Modified Identity Based Encryption”, EMITTER International Journal of Engineering Technology, ISSN: 2355-391X, Online ISSN: 2443-1168, Vol. 7, No. 2, 2019. [full paper]
41
Louis Arif, Ali Ridho Barakbah, Amang Sudarsono, and Renovita Edelani, “Big Data Environment for Realtime Earthquake Data Acquisition and Visualization”, International Journal of Informatics Visualization (JOIV), ISSN: 2549-9610, Vol. 3, No. 4, pp. 365-376, Nov. 2019. [full paper]
40
Dian Neipa Purnamasari, Amang Sudarsono, and Prima Kristalina, “Secure e-Health Record System Using Identity-based Encryption with Embedded Key”, International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), Vol. 9, No. 5, pp. 1496-1504, 2019. [full paper]
39
Novi Aryani Fitri, M. Udin Harun Al Rasyid, and Amang Sudarsono, “Medical Health Record Protection Using Ciphertext-Policy Attribute-Based Encryption and Elliptic Curve Digital Signature Algorithm”, EMITTER International Journal of Engineering Technology, ISSN: 2355-391X, Online ISSN: 2443-1168, Vol. 7, No. 1, pp. 151-175, 2019. [full paper]
38
Ali Ridho Barakbah, Tri Harsono, and Amang Sudarsono, “Automatic Cluster-oriented Seismicity Prediction Analysis of Earthquake Data Distribution in Indonesia”, International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), Vol. 9, No. 2, pp. 587-593, 2019. [full paper]
37
Cindha Riri Pratiwi, Prima Kristalina, and Amang Sudarsono, “A Performance Evaluation of Modified Weighted Pathloss Scenario Based on the Cluster Based-PLE for an Indoor Positioning of Wireless Sensor Network”, International Journal of Engineering and Technology Innovation (IJETI), Vol. 9, No. 1, pp. 61-74, 2019. [full paper]
36
Rafina Destiarti Ainul, Prima Kristalina, and Amang Sudarsono, “Hybrid Filter Scheme for Optimizing Indoor Mobile Cooperative Tracking System”, Telkomnika (Telecommunication Computing Electronics and Control), Vol. 16, No. 6, pp. 2536-2548, 2018. [full paper]
35
Munsyi, Amang Sudarsono, and M. Udin Harun Al Rasyid, “Secure Data Exchange Using Authenticated Attribute-Based Encryption with Revocation for Environmental Monitoring”, International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), Vol. 8, No. 5, pp. 1948-1955, 2018. [full paper]
34
Yesta Medya Mahardhika, Amang Sudarsono, and Aliridho Barakbah, “Botnet Detection Using On-line Clustering with Pursuit Reinforcement Competitive Learning (PRCL)”, EMITTER International Journal of Engineering Technology, Vol. 6, No. 1, ISSN: 2443-1168, pp. 1-21. June, 2018. [full paper]
33
Asti Putri Rahmadini, Prima Kristalina, and Amang Sudarsono, “Optimization of Fingerprint Indoor Localization System for Multiple Object Tracking Based on Iterated Weighting Constant-KNN Method”, International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), Vol. 8, No. 3, pp. 998-1007, 2018. [full paper]
32
Nihayatus Sa'adah, I Gede Puja Astawa, and Amang Sudarsono, “Confidential Data Transmission Using Subcarrier Randomization with RSA Algorithm for Synchronization on MIMO-OFDM System”, International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), Vol. 8, No. 2, 2018. [full paper]
31
Rafina Destiarti Ainul, Prima Kristalina, and Amang Sudarsono, “SWOT: Secure Wireless Object Tracking with Key Renewal Mechanism for Indoor Wireless Sensor Network”, International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), Vol. 8, No. 2, 2018. [full paper]
30
Nurul Fahmi, Samsul Huda, Amang Sudarsono, and M. Udin Harun Al Rasyid, “Fuzzy Logic for an Implementation Environment Health Monitoring System Based on Wireless Sensor Network”, International Journal of Telecommunication, Electronic and Computer Engineering (JTEC), Vol. 9, Issue 2-4, pp. 119-122, 2017 [full paper]
29
Muh Subhan, Amang Sudarsono, and Ali Ridho Barakbah, “Classification of Radical Web Content in Indonesia using Web Content Mining and k-Nearest Neighbor Algorithm”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2443-1168, Vol. 5, No. 2, pp. 328-348, Dec., 2017. [full paper]
28
Djoko Santoso, I Gede Puja Astawa, and Amang Sudarsono, “MIMO-OFDM System with ZF and MMSE Detection Based On Single RF Using Convolutional Code”, International Journal of Engineering and Applied Sciences (IJEAS), ISSN: 2394-3661, Vol. 4, Issue 11, pp. 55-61, Nov., 2017. [full paper]
27
Rafina Destiarti Ainul, Prima Kristalina, and Amang Sudarsono, “Modified Iterated Extended Kalman Filter for Mobile Cooperative Tracking System”, International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), Vol. 7, No. 3, pp. 980-992, 2017. [full paper]
26
Munsyi, Amang Sudarsono, and M. Udin Harun Al Rasyid, “Secure Data Sensor in Environmental Monitoring System Using Attribute-Based Encryption with Revocation”, International Journal on Advanced Science, Engineering and Information Technology (IJASEIT), Vol. 7, No. 2, pp. 609-624, 2017. [full paper]
25
Amang Sudarsono and Toru Nakanishi, “A Secure Data Exchange System in Wireless Delay Tolerant Network Using Attribute-Based Encryption”, Journal of Information Processing, Vol. 25, pp. 234-243, Feb., 2017. [abstract and full paper]
24
Rizky Pratama Hudhajanto, I Gede Puja Astawa, and Amang Sudarsono, “Performance Comparison of Coded and Uncoded MIMO-OFDM with Linear and Non-Linear Detector”, Indian Journal of Science and Technology, Vol. 9, Issue 48, pp. 1-7, Dec., 2016. [full paper]
23
Novita Astin, I Gede Puja Astawa, and Amang Sudarsono, “Performance Analysis of Video Transmission Using Sequential Distortion Minimization Method for Digital Video Broadcasting Terrestrial”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2443-1168, Vol. 4, No. 2, pp. 291-307, Dec., 2016. [full paper]
22
Muh. Alfan Taufiqurrahman, I Gede Puja Astawa, and Amang Sudarsono, “Performance Analysis of Circular 8-QAM Constellation with MMSE Equalizer for OFDM System Using USRP”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2443-1168, Vol. 4, No. 2, pp. 259-276, Dec., 2016. [full paper]
21
R. Gaguk Pratama Yudha, I Gede Puja Astawa, and Amang Sudarsono, “Performance Analysis of CP-Based and CAZAC Training Sequence-Based Synchronization in OFDM System”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2443-1168, Vol. 4, No. 2, pp. 221-236, Dec., 2016. [full paper]
20
Nurul Fahmi, M. Udin Harun Al Rasyid, and Amang Sudarsono, “Adaptive Sleep Scheduling for Health Monitoring System Based on the IEEE 802.15.4 Standard”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2443-1168, Vol. 4, No. 1, pp. 91-114, June, 2016. [full paper]
19
Samsul Huda, Amang Sudarsono, and Tri Harsono, “Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2443-1168, Vol. 4, No. 1, pp. 115-140, June, 2016. [full paper]
18
Rizky Pratama Hudhajanto, I Gede Puja Astawa, and Amang Sudarsono, “Covert Communication in MIMO-OFDM System Using Pseudo Random Location of Fake Subcarriers”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2443-1168, Vol. 4, No. 1, pp. 150-163, June, 2016. [full paper]
17
Samsul Huda, Nurul Fahmi, Amang Sudarsono, and M. Udin Harun Al Rasyid, “Secure Data Sensor Sharing on Ubiquitous Environmental Health Monitoring Application”, Jurnal Teknologi (Sciences & Engineering) 78:6-3 (2016), pp. 53-58, 2016. [full paper]
16
Amang Sudarsono, Samsul Huda, Nurul Fahmi, M. Udin Harun Al Rasyid, and Prima Kristalina, “Secure Data Exchange in Environmental Health Monitoring System through Wireless Sensor Network”, International Journal of Engineering and Technology Innovation (IJETI), Vol. 6, No. 2, pp. 103-122, Taiwan, March, 2016 [Scopus]. [full paper]
15
M. Udin Harun Al Rasyid, Isbat Uzzin Nadhori, Amang Sudarsono, and Yodhista Tulus Alnovinda, “Pollution Monitoring System Using Gas Sensor based on Wireless Sensor Network”, International Journal of Engineering and Technology Innovation (IJETI), Vol. 6, No. 1, pp. 79-91, Taiwan, Dec. 2015 [Scopus]. [full paper]
14
M. Udin Harun Al Rasyid, Bih-Hwang Lee, and Amang Sudarsono, “Partition-Based GTS Adjustment for Wireless Sensor Networks”, Journal of ICT Research and Applications ITB, Vol. 9, No. 2, pp. 162-176, 2015 [Scopus]. [full paper]
13
Ahmad Zainudin, Amang Sudarsono, and Kevin Prima Pambudi, “Performance Analysis of DTN Using Level Signal Priority Epidemic Routing Protocol”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 3, No. 2, December, 2015. [full paper]
12
Amang Sudarsono, Anang Siswanto, Heru Iswanto, and Qoirul Setiawan, “Traffic Analysis of Quality of Service (QoS) for Video Conferencing between Main Campus and Sub Campus in Laboratory Scale”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 3, No. 2, pp. 1-17, December, 2015. [full paper]
11
Hendy Briantoro, I Gede Puja Astawa, and Amang Sudarsono, “An Implementation of Error Minimization Data Transmission in OFDM using BCH Code and Convolutional Code”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 3, No. 2, December, 2015. [full paper]
10
Mike Yuliana, Ghandra Awaludinsyah, Aries Pratiarso, and Amang Sudarsono, “Design and Implementation of a Secured Personal Identity Based ECC and ECDSA: An Inpatient System”, European Scientific Journal, Vol. 11, No. 21, ISSN: 1857-7881 (Print) e-ISSN 1857-7431, pp. 473-483, July, 2015.
9
Zakha Maisat Eka Darmawan, M. Udin Harun Al Rasyid, and Amang Sudarsono, “Modified GTS Allocation Scheme for IEEE 802.15.4”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 3, No. 1, pp. 81-91, June, 2015. [full paper]
8
M. Udin Harun Al Rasyid, Bih-Hwang Lee, Amang Sudarsono, and Taufiqurrahman, “Implementation of Body Temperature and Pulseoximeter Sensors for Wireless Body Area Network”, Sensors and Materials, International Journal on Sensor Technology [SCIE, Scopus], ISSN 0914-4935, Vol. 27, No. 8, pp. 727-732, Feb., 2015.
7
Vivien Arief Wardhany, Sritrusta Sukaridhoto, and Amang Sudarsono, “Indonesian Automatic Speech Recognition for Command Speech Controller Multimedia Player”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 2, No. 2, pp. 39-48, Dec, 2014. [full paper]
6
Mike Yuliana, Isbat Uzzin Nadhori, and Amang Sudarsono, “RFID Technology for Securing e-Health System: Service of Consulting a Doctor”, European Scientific Journal, Vol. 10, No. 27, ISSN: 1857-7881 (Print) e-ISSN 1857-7431, pp. 95-104, Sept., 2014.
5
Indah Yulia Prafitaning Tiyas, Ali Ridho Barakbah, Tri Harsono, and Amang Sudarsono, “Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 2, No. 1, pp. 39-49, June, 2014. [full paper]
4
Ahmad Zainudin, Amang Sudarsono, and I Gede Puja Astawa, “Performance Analysis of An OFDM PHY Scheme with Zero Forcing Equalizer Using Software Defined Radio Platform and USRP”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 2, No. 1, pp. 26-38, June, 2014. [full paper]
3
Ismed Jauhar, Amang Sudarsono, and Mike Yuliana, “Secure Ubiquitous Sensor Network Based on Elliptic Curve Menezes Qu Vanstone as Status Data Supply of Environment in Disaster Management”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 1, No. 1, pp. 1-10, Dec., 2013. [full paper]
2
Amang Sudarsono, Toru Nakanishi, and Nobuo Funabiki, “A Pairing-Based Anonymous Credential System with Efficient Attribute Proofs”, Journal of Information Processing, Vol. 20, No. 3, pp. 774-784, July, 2012 (Recommended paper). [abstract and full paper]
1
Amang Sudarsono, Toru Nakanishi, Yasuyuki Nogami, and Nobuo Funabiki, “Anonymous IEEE802.1X Authentication System Using Group Signatures”, Journal of Information Processing, Vol. 18, pp. 63-76, March, 2010. [abstract and full paper]
Conference Papers:

2020
7
Choirun Nisa, Amang Sudarsono, and Mike Yuliana, "RSS-based Secret Key Establishment using Middle-Point Quantization and Clover Filter Algorithm", 2020 International Electronics Symposium (IES), pp. 131-138, 2020. [Best Paper Award]
6
Rasyiq Farandi, Amang Sudarsono, and Moch. Zen Samsono Hadi, "A Mobile Application of User Traveling-Behavior Tracking using Heuristic Method", 2020 International Electronics Symposium (IES), pp. 507-512, 2020.
5
Muhammad Taufiq Sumadi, Mike Yuliana, and Amang Sudarsono, "Performance Improvement Based on Modified Lossless Quantization (MLQ) for Secret Key Generation Extracted from Received Signal Strength", 2020 International Electronics Symposium (IES), pp. 190-194, 2020.
4
Febby Ronaldo, Dadet Pramadihanto, and Amang Sudarsono, "Secure Communication System of Drone Service using Hybrid Cryptography over 4G/LTE Network", 2020 International Electronics Symposium (IES), pp. 116-122, 2020.
3
Fajar Manghayu Nuswantoro, Amang Sudarsono, and Tri Budi Santoso, "Abnormal Driving Detection Based on Accelerometer and Gyroscope Sensor on Smartphone using Artificial Neural Network (ANN) Algorithm", 2020 International Electronics Symposium (IES), pp. 356-363, 2020.
2
Saifudin Usman, Idris Winarno, and Amang Sudarsono, "Implementation of SDN-based IDS to protect Virtualization Server against HTTP DoS attacks", 2020 International Electronics Symposium (IES), pp. 195-198, 2020.
1
Amang Sudarsono, "An Implementation of Efficient Group Signature for Anonymous Authentication System in Vehicular Ad-Hoc Networks", 2020 International Electronics Symposium (IES), pp. 108-115, 2020.

2019
6
Inka Trisna Dewi, Amang Sudarsono, Prima Kristalina, and Mike Yuliana, "Reciprocity Enhancement in V2V Key Generation System by using HPK Method", International Electronics Symposium on Engineering Technology and Applications (IES-ETA 2019), Surabaya, Sept. 27-28, 2019.
5
Anindya Dwi Putri Islamidina, Amang Sudarsono, and Titon Dutono, "Security System for Data Location of Travelling User using RSA based on Group Signature", International Electronics Symposium on Engineering Technology and Applications (IES-ETA 2019), Surabaya, Sept. 27-28, 2019.
4
Amang Sudarsono, Mike Yuliana, Prima Kristalina, Reni Soelistijorini, and Adib Muhammad Visoka, "An Implementation of Shared Symmetric Key Generation Extracted from Received Signal Strength in Vehicle to Infrastructure Communication", International Electronics Symposium on Engineering Technology and Applications (IES-ETA 2019), Surabaya, Sept. 27-28, 2019. [Best Paper Award]
3
Ekoprayitno, Nurul Fahmi, M. Udin Harun Al Rasyid, and Amang Sudarsono, "Smart Environment: Accuracy of a server side model in design topology WSN and IoT", International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC 2019), Surabaya, Sept. 27-28, 2019.
2
Agostinho Marques Ximenes, Sritrusta Sukaridhoto, Amang Sudarsono, Mochammad Rifki Ulil Albaab, Hasan Basri, Muhammad Aksa Hidayat Yani, Chew Chang Choon, and Ezharul Islam, "Implementation QR Code Biometric Authentication for Online Payment", International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC 2019), Surabaya, Sept. 27-28, 2019.
1
Amang Sudarsono, Mike Yuliana, and Prima Kristalina, "A Shared Secret Key Generation between Vehicle and Roadside Based Preprocessing Method", International Conference of Computer Engineering, Network, and Intelligent Multimedia (CENIM 2019), pp. 57-64, 2019.

2018
10
Amang Sudarsono, Mike Yuliana, Prima Kristalina, and Ali Ridho Barakbah, "An Implementation of Shared Key Generation Extracted from Received Signal Strength in Vehicular Ad-Hoc Communication", The Sixth International Symposium on Computing and Networking (CANDAR'18), Hida Takayama, Japan, Nov. 27-30, 2018. [Outstanding Paper Award]
9
Amang Sudarsono, Mike Yuliana, and Prima Kristalina, "An Implementation of Secure Monitoring System to Track Member in A Tour Group Using Group Signature", The International Conference on Computer Engineering, Network and Intelligent Multimedia 2018 (CENIM 2018), pp. 113-119, Surabaya, Nov. 26-27, 2018.
8
Amang Sudarsono, Mike Yuliana, and Prima Kristalina, "A Reciprocity Approach for Shared Secret Key Generation Extracted from Received Signal Strength in The Wireless Networks", International Electronics Symposium on Engineering Technology and Applications (IES-ETA 2018), Bali, Oct. 29-30, 2018.
7
Nihayatus Sa'adah, I Gede Puja Astawa, and Amang Sudarsono, "Performance of OFDM Communication System with RSA Algorithm as Synchronization on SR Security Scheme Using USRP Devices", International Electronics Symposium on Engineering Technology and Applications (IES-ETA 2018), Bali, Oct. 29-30, 2018. [Best Paper Award]
6
Afifah Ramadhani, Prima Kristalina, and Amang Sudarsono, "Performance Evaluation of Refinement Method in Indoor Localization", International Electronics Symposium on Engineering Technology and Applications (IES-ETA 2018), Bali, Oct. 29-30, 2018.
5
Gigih Yumantoro, Prima Kristalina, and Amang Sudarsono, "Performance Evaluation of Indoor Characteristic based on Bluetooth Low Energy Communication System through Statistical Approach", International Electronics Symposium on Engineering Technology and Applications (IES-ETA 2018), Bali, Oct. 29-30, 2018.
4
Asti Putri Rahmadini, Prima Kristalina, and Amang Sudarsono, "Implementation of Dead Reckoning System Using Fingerprint and K-NN Algorithm for An Object Position and Posture Estimation", International Electronics Symposium on Engineering Technology and Applications (IES-ETA 2018), Bali, Oct. 29-30, 2018.
3
Dian Neipa Purnamasari, Amang Sudarsono, and Prima Kristalina, "Secure Data Sharing Scheme Using Identity-based Encryption for e-Health Record", International Electronics Symposium on Engineering Technology and Applications (IES-ETA 2018), Bali, Oct. 29-30, 2018.
2
Novi Fitri, M. Udin Harun Al Rasyid, and Amang Sudarsono, "Secure Attribute-Based Encryption With Access Control to Data Medical Records", International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC 2018), Bali, Oct. 29-30, 2018.
1
Munsyi, Amang Sudarsono, and M. Udin Harun Al Rasyid, "An Implementation of Data Exchange in Environmental Monitoring Using Authenticated Attribute-Based Encryption with Revocation", International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC 2018), Bali, Oct. 29-30, 2018.

2017
13
Robihul Mufid, M. Udin Harun Al Rasyid, and Amang Sudarsono, "Allocation Strategy Guaranteed Time Slots (GTS) on Real Hardware Wireless Sensor Network (WSN)", The 11th International Conference on Information & Communication Technology and System (ICTS 2017), Oct. 31, 2017.
12
Amang Sudarsono, Mike Yuliana, and Haryadi Amran Darwito, "A Secure Data Sharing Using Identity‐Based Encryption Scheme for e‐Healthcare System", International Conference on Science in Information Technology (ICSitech 2017), Oct. 25-26, 2017.
11
Ali Ridho Barakbah, Tri Harsono, Amang Sudarsono, and Roy Advandy Aliefyan, "Big Data Analysis for Spatio-Temporal Earthquake Risk-Mapping System in Indonesia with Automatic Clustering", International Conference on Big Data Research (ICBDR 2017), Oct. 22-24, Osaka, Japan, 2017. [Best Paper Award]
10
Yesta Mahardhika, Amang Sudarsono, and Ali Ridho Barakbah, "An Implementation of Botnet Dataset to Predict Accuracy Based on Network Flow Model", International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC 2017), Sep. 26-27, 2017.
9
Munsyi, Amang Sudarsono, and M. Udin Harun Al Rasyid, "An Implementation of Data Exchange Using Authenticated Attribute-Based Encryption for Environmental Monitoring", International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC 2017), Sep. 26-27, 2017.
8
Muh Subhan, Amang Sudarsono, and Ali Ridho Barakbah, "Preprocessing of Radicalism Dataset to Predict Radical Content in Indonesia", International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC 2017), Sep. 26-27, 2017.
7
Zuyina Saputri, Amang Sudarsono, and Mike Yuliana, "E-Voting Security System for the Election of EEPIS BEM President", International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC 2017), Sep. 26-27, 2017.
6
Ali Ridho Barakbah, Amang Sudarsono, Tri Harsono, "A Mobile Application for Cluster-based Visualization of Spatio-Temporal Earthquake Data Distribution in Indonesia", International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC 2017), Sep. 26-27, 2017.
5
Renovita Edelani, Ali Ridho Barakbah, Tri Harsono, and Amang Sudarsono, "Association Analysis Of Earthquake Distribution In Indonesia For Spatial Risk Mapping", International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC 2017), Sep. 26-27, 2017.
4
Rafina Destiarti Ainul, Prima Kristalina, and Amang Sudarsono, "Secure Data Transmission Scheme for Indoor Mobile Cooperative Localization System", International Electronics Symposium on Engineering Technology and Applications (IES-ETA 2017), Sep. 26-27, 2017.
3
Erika Rahmawati, Mariska Listyasari, Adam Shidqul Aziz, Sritrusta Sukaridhoto, Fardani Damastuti, Mochamad Mobed Bachtiar, and Amang Sudarsono, "Digital Signature On File Using Biometric Fingerprint With Fingerprint Sensor On Smartphone", International Electronics Symposium on Engineering Technology and Applications (IES-ETA 2017), Sep. 26-27, 2017.
2
Nihayatus Sa'adah, I Gede Puja Astawa, and Amang Sudarsono, "Asymmetric Cryptography for Synchronization on MIMO-OFDM System", International Electronics Symposium on Engineering Technology and Applications (IES-ETA 2017), Sep. 26-27, 2017.
1
Asti Putri Rahmadini, Prima Kristalina, and Amang Sudarsono, "An Improved Fingerprint Method Based on K-NN Algorithm for Indoor Multiple Object Tracking", International Electronics Symposium on Engineering Technology and Applications (IES-ETA 2017), Sep. 26-27, 2017. [Best Paper Award]

2016
12
Mike Yuliana, Haryadi Amran Darwito, Amang Sudarsono, and Gabymars Yofie, “Privacy and Security of Sharing Referral Medical Record for Health Care System”, 2nd International Conference on Science in Information Technology (ICSITech), pp. 232-237, 2016.
11
Bagas Mardiasyah Prakoso, Pristy Ar Nurisysyifak, Muhammad Arsyad, Andryan Bagoes Noegroho, Amang Sudarsono, and Ahmad Zainudin, “Performance Analysis of OLSR Routing for Secure Medical Data Transmission for Rural Areas with Delay Tolerant Network”, International Symposium on Electronics and Smart Devices (ISESD 2016), November 29-30, Bandung, 2016.
10
Cindha Pratiwi, Prima Kristalina, and Amang Sudarsono, “Cluster-Based Pathloss Exponential Modeling for Indoor Positioning in Wireless Sensor Network”, The Fifth International Conference on Knowledge Creation and Intelligent Computing (KCIC), pp. 53-59, Nov., 15-17, Manado, 2016.
9
Munsyi, Amang Sudarsono, and M. Udin Harun Al Rasyid, “Secure Data Sensor Access Using Attribute-Based Encryption with Revocation for Environmental Monitoring”, The Fifth International Conference on Knowledge Creation and Intelligent Computing (KCIC), pp. 73-79, Nov., 15-17, Manado, 2016.
8
Rafina Destiarti Ainul, Prima Kristalina, and Amang Sudarsono, “Mobile Cooperative Tracking with RSSI Ranging in EKF Algorithm for Indoor Wireless Sensor Network”, The Fifth International Conference on Knowledge Creation and Intelligent Computing (KCIC), pp. 60-66, Nov., 15-17, Manado, 2016.
7
Rafina Destiarti Ainul, Prima Kristalina, and Amang Sudarsono, “Cluster-Based PLE Areas for Mobile Cooperative Localization in Indoor Wireless Sensor Network”, The 8th 2016 International Conference on Information Technology and Electrical Engineering (ICITEE), Oct. 5-6, 2016.
6
Prima Kristalina, Amang Sudarsono, Mohammad Syafrudin, and Bimantara Ksatria Putra, “SCLoc: Secure Localization Platform for Indoor Wireless Sensor Network”, International Electronic Symposium (IES), pp. 424-429, Bali, Sept. 29-30, 2016. [Best Paper Award]
5
Ahmad Zainudin, Amang Sudarsono, and Bagas Mardiasyah Prakoso, “An Implementation of Secure Medical Data Delivery for Rural Areas Through Delay Tolerant Network”, International Electronic Symposium (IES), pp. 418-423, Bali, Sept. 29-30, 2016.
4
Amang Sudarsono, M. Udin Harun Al Rasyid, and Mike Yuliana, “An Implementation of Anonymous Authentication System in Wireless Sensor Network Using VLR Group Signature”, International Electronic Symposium (IES), pp. 281-286, Bali, Sept. 29-30, 2016.
3
Amang Sudarsono and M. Udin Harun Al Rasyid, “An Anonymous Authentication System in Wireless Networks Using Verifier-Local Revocation Group Signature Scheme”, International Seminar on Intelligent Technology and Its Applications (ISITIA), pp. 49-54, Jul. 28–30, 2016.
2
M. Udin Harun Al Rasyid, Achmad Sayfudin, Arif Basofi, and Amang Sudarsono, “Development of Semantic Sensor Web For Monitoring Environment Conditions”, International Seminar on Intelligent Technology and Its Applications (ISITIA), pp. 611-615, Jul. 28–30, 2016.
1
M. Udin Harun Al Rasyid, Alif Akbar Pranata, Bih-Hwang Lee, Ferry Astika Saputra, and Amang Sudarsono, “Portable Electrocardiogram Sensor Monitoring System Based On Body Area Network”, IEEE International Conference on Consumer Electronics – Taiwan (ICCE-TW), May 27-29, 2016.

2015
11
Nurul Fahmi, Samsul Huda, M. Udin Harun Al Rasyid, and Amang Sudarsono, “Fuzzy Logic for An Implementation Environment Health Monitoring System Based on Wireless Sensor Network”, 2015 Recent Advancement in Informatics, Electrical and Electronics Engineering International Conference (RAIEIC2015), Medan, Dec. 10–12, 2015.
10
Samsul Huda, Nurul Fahmi, Amang Sudarsono, and M. Udin Harun Al Rasyid, “Secure Data Sensor Sharing on Ubiquitous Environmental Health Monitoring Application”, 2015 Recent Advancement in Informatics, Electrical and Electronics Engineering International Conference (RAIEIC2015), Medan, Dec. 10–12, 2015.
9
Amang Sudarsono and Toru Nakanishi, “An Implementation of Secure Data Exchange System with Multi-hop Routing in Wireless Delay Tolerant Network Using Attribute-Based Encryption”, 3rd International Symposium on Computing and Networking (CANDAR 2015), pp. 470-476, Dec. 8-11, Sapporo, Hokkaido, Japan, 2015.
8
Mike Yuliana, Aries Pratiarso, and Amang Sudarsono, “Proof of Attributes Based CL Signature Scheme on e-Health Applications”, International Conference on Science in Information Technology (ICSITech) 2015, pp. 253-258, Oct. 27-28, Yogyakarta, Indonesia, 2015.
7
Amang Sudarsono, Prima Kristalina, M. Udin Harun Al Rasyid, and Rony Hermawan, “An Implementation of Secure Data Sensor Transmission in Wireless Sensor Network for Monitoring Environmental Health”, International Conference on Computer, Control, Informatics and its Applications (IC3INA) 2015, pp. 94-99, Oct. 5-7, Bandung, Indonesia, 2015.
6
M. Udin Harun Al Rasyid, Amang Sudarsono, Idris Winarno, and Dika Dwi Hari Rupawan, “Guaranteed Time Slot Allocation Method for IEEE 802.15.4 Wireless Sensor Network”, International Conference on Computer, Control, Informatics and its Applications (IC3INA) 2015, pp. 86-89, Oct. 5-7, Bandung, Indonesia, 2015.
5
M. Udin Harun Al Rasyid, Bih-Hwang Lee, and Amang Sudarsono, “Wireless Body Area Network for Monitoring Body Temperature, Heart Beat and Oxygen in Blood”, International Seminar on Intelligent Technology and Its Applications (ISITIA), pp. 93-96, May 20, Surabaya, Indonesia, 2015.
4
M. Udin Harun Al Rasyid, Bih-Hwang Lee, Amang Sudarsono, and Imam Mahfud, “Monitoring System of Patient Position Based On Wireless Body Area Sensor Network”, IEEE International Conference on Consumer Electronics – Taiwan (ICCE-TW), June 6-8, NTUST Taipei Taiwan, 2015.
3
Vivien Arief Wardhany, Muhammad Hendrick Kurnia, Sritrusta Sukaridhoto, Amang Sudarsono, and Dadet Pramadihanto, “Smart Presentation System using Hand Gestures and Indonesian Speech Command”, 2015 International Electronics Symposium (IES 2015), pp. 74-78, Sept. 29-30, Surabaya, 2015.
2
Samsul Huda, Amang Sudarsono, and Tri Harsono, “Secure Data Exchange using Authenticated Ciphertext-Policy Attributed-Based Encryption”, 2015 International Electronics Symposium (IES 2015), pp. 140-145, Sept. 29-30, Surabaya, 2015.
1
Asif Ali Zamzami, Ega Devara, Joni Pramana, Amang Sudarsono, and Ahmad Zainudin, “Reliability Analysis of GSM Network Using Software Defined Radio-Based System”, 2015 International Electronics Symposium (IES 2015), pp. 280-285, Sept. 29-30, Surabaya, 2015.

2014
8
Amang Sudarsono and Toru Nakanishi, “An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption”, 2nd International Symposium on Computing and Networking (CANDAR 2014), pp. 536-542, Dec. 10-12, Shizuoka, Japan, 2014.
7
M. Udin Harun Al Rasyid, Amang Sudarsono, and Bih-Hwang Lee, “The study of pulse oxygen and body temperature sensor for e-health application”, The 3rd International Conference on Engineering and Technology Innovation (ICETI) 2014, Oct. 31 - Nov. 4, Kenting Taiwan, 2014.
6
Amang Sudarsono, M. Udin Harun Al Rasyid, and Hendhi Hermawan, “An Implementation of Secure Wireless Sensor Network for e-Healthcare System”, International Conference on Computer, Control, Informatics and its Applications (IC3INA) 2014, pp. 75-80, Oct. 21-23, Bandung, Indonesia, 2014.
5
M. Udin Harun Al Rasyid, Isbat Uzzin Nadhori, Amang Sudarsono, and Ridho Luberski, “Analysis of Slotted and Unslotted CSMA/CA Wireless Sensor Network for e-Healthcare System”, International Conference on Computer, Control, Informatics and its Applications (IC3INA) 2014, pp. 59-63, Oct. 21-23, Bandung, Indonesia, 2014.
4
Mike Yuliana, Amang Sudarsono, and Isbat Uzzin Nadhori, “Protection System of Client's Privacy on e-Health Services”, The 8th International Conference on Information & Communication Technology and Systems (ICTS) 2014, Sep. 24-25, Surabaya, Indonesia, 2014.
3
Amang Sudarsono, Sritrusta Sukaridhoto, Toru Nakanishi, and Nobuo Funabiki, “Secure Content Exchange in Delay Tolerant Networks Using Attribute-Based Encryption”, Proceeding of The 3rd Indonesian-Japanese Conference on Knowledge Creation & Intelligent Computing 2014 (KCIC2014), pp. 35-43, Mar. 25-26, Malang, Indonesia, 2014.
2
Indah Yulia Prafitaning Tiyas, Ali Ridho Barakbah, Tri Harsono, and Amang Sudarsono, “Intrusion Detection with On-Line Clustering Using Reinforcement Learning”, Proceeding of The 3rd Indonesian-Japanese Conference on Knowledge Creation & Intelligent Computing 2014 (KCIC2014), pp. 50-57, Mar. 25-26, Malang, Indonesia, 2014.
1
Ahmad Zainudin, I Gede Puja Astawa, Amang Sudarsono, and Yoedy Moegiharto, “A Comparison of CP-OFDM Schemes Performance Using SDR-based Experimental Testbed”, International Electronics Symposium (IES) 2014, ISBN: 978-602-0917-14-6, pp. 145-150, Dec., Surabaya, 2014.

2013
5
M. Udin Harun Al Rasyid, Bih-Hwang Lee, and Amang Sudarsono, “PEGAS: Partitioned GTS Allocation Scheme for IEEE 802.15.4 Networks”, International Conference on Computer, Control, Informatics and its Applications (IC3INA) 2013, Nov. 19-20, Jakarta, Indonesia, 2013.
4
Ahmad Zainudin, Amang Sudarsono, and I Gede Puja Astawa, “Reliability Analysis of Digital Communication for Various Data Types Transmission Using GNU Radio and USRP”, Proceeding of The 15th Industrial Electronics Seminar 2013 (IES2013), pp. 91-96, Oct. 23, Surabaya, Indonesia, 2013.
3
Amang Sudarsono, “Anonymous On-Demand Routing Protocol Using Pairing-Based Group Signature”, Proceeding of The 15th Industrial Electronics Seminar 2013 (IES2013), pp. 76-84, Oct. 23, Surabaya, Indonesia, 2013.
2
Zakha Maisat Eka Darmawan, M. Udin Harun Al Rasyid, and Amang Sudarsono, “Throughput Performance of a Beacon Enabled IEEE802.15.4 Star with Guaranteed Time Slot”, Proceeding of The 15th Industrial Electronics Seminar 2013 (IES2013), pp. 126-129, Oct. 23, Surabaya, Indonesia, 2013.
1
Amang Sudarsono and Mike Yuliana, “A Light-Weight Group Signature Scheme for Wireless Networks Based-on BBS Short Group Signature”, Proceeding of The 2nd Indonesian-Japanese Conference on Knowledge Creation & Intelligent Computing 2013 (KCIC2013), pp. 93-98, Mar. 20-21, Bali, Indonesia, 2013.

2012
1
Amang Sudarsono and Mike Yuliana, “An Implementation of Digital Signature and Key Agreement on IEEE802.15.4 WSN Embedded Device”, Proceeding of The 14th Industrial Electronics Seminar 2012 (IES2012), pp. 115-120, Oct. 24, Surabaya, Indonesia, 2012.

2011
2
Amang Sudarsono, Toru Nakanishi, and Nobuo Funabiki, “An Implementation of a Pairing-Based Anonymous Credential System with Constant Complexity”, Proceeding of The International Multi Conference of Engineers and Computer Scientists 2011 (IMECS2011), pp. 630-635, March 16-18, Hong Kong, 2011. [pdf file]
1
Amang Sudarsono, Toru Nakanishi, and Nobuo Funabiki, “Efficient Proofs of Attributes in Pairing-Based Anonymous Credential System”, Proceeding of The 11th Privacy Enhancing Technologies Symposium (PETS2011), LNCS 6794, Springer-Verlag, pp. 246-263, July, Waterloo, Canada, 2011. [abstract][pdf file]

2010
3
Amang Sudarsono, Toru Nakanishi, and Nobuo Funabiki, “Efficient Proofs of Attributes in Anonymous Credential Systems Using a Pairing-Based Accumulator”, Proceeding of Computer Security Symposium 2010 (CSS2010), pp. 801-806, 2010.
2
Masamitsu Sato, Amang Sudarsono, Toru Nakanishi, and Nobuo Funabiki, “An Implementation of An Anonymous IEEE802.1X Authentication Protocol with Collaborations among Organizations”, Proceeding of Computer Security Symposium 2010 (CSS2010), pp. 285-290, 2010.
1
Amang Sudarsono, Toru Nakanishi, and Nobuo Funabiki, “An Implementation of a Pairing-Based Anonymous Credential System with Constant Complexity”, Proceeding of IEICE Tech. Rep., vol. 110, no. 339, NS2010-135, pp. 179-184, 2010. [abstract]

2009
2
Amang Sudarsono, Toru Nakanishi, Yumi Sakemi, Yasuyuki Nogami, and Nobuo Funabiki, “An Implementation of a Group Signature Scheme with Efficient Verifier-Local Revocation Check”, IEICE Tech. Rep., vol. 109, no. 42, ISEC2009-6, pp. 37-42, May 22, 2009. [abstract]
1
Toru Nakanishi, Amang Sudarsono, Yumi Sakemi, Yasuyuki Nogami, and Nobuo Funabiki, “A Group Signature Scheme with Efficient Verifier-Local Revocation Check”, Proceeding of The 2009 Symposium on Cryptography and Information Security (SCIS 2009), Otsu, Japan, 2B4-2, Jan 20-23, 2009. [abstract&intro]

2008
2
Amang Sudarsono, Toru Nakanishi, Yasuyuki Nogami, and Nobuo Funabiki, “An Implementation of Anonymous IEEE802.1X Authentication System for Wireless Networks”, Proceeding of The 10th Industrial Electronic Seminar 2008, Network and Communication System Session, Electronics Engineering Polytechnic Institute of Surabaya (EEPIS), Surabaya, Indonesia, pp. 23-30, October 30, 2008.
1
Amang Sudarsono, Toru Nakanishi, Kouhei Miki and Nobuo Funabiki, “An Implementation of Anonymous IEEE802.1X Authentication with User Revocation”, The 3rd Joint Workshop on Information Security (JWIS 2008), July 10-11, Hanyang University, Seoul, Korea. pp. 112-125, 2008.

Others:
20*
Ahmad Zainudin, Tribudi Santoso, Ari Wijayanti, Aries Pratiarso, Amang Sudarsono, Haniah Mahmudah, Nur Adi Siswandari, Anang Budikarso, Nanang Syahroni, Hari Wahyuningrat S., Anang Siswanto, Farel Juliansyah, Donny Farhan, dan Tri Susanti, “Pemanfaatan Alat Monitoring Kadar Air Pada Gabah untuk Peningkatkan Kualitas Panen”, dipublikasikan di DIKEMAS (Jurnal Pengabdian Kepada Masyarakat), Vol. 4, No. 2, 2020. [full paper]
19*
Dian Neipa Purnamasari, Amang Sudarsono, and Prima Kristalina, “Modifikasi Identity-based Encryption pada Keamanan dan Kerahasiaan Data Rekam Medis”, Jurnal INOVTEK PolBeng, Vol: 9, No: 2, pp. 196-203, 2019. [full paper]
18*
Agostinho Marques Ximenes, Sritrusta Sukaridhoto, Amang Sudarsono, and Hasan Basri, “Mobile Platform Biometric Cloud Authentication”, dipublikasikan pada INTEK: Jurnal Penelitian, Vol. 6 No. 2, pp. 75-84, 2019. [full paper]
17*
Prima Kristalina, Florista Dewi, Mike Yuliana, Tri Budi Santoso, Amang Sudarsono, and Reni Soelistijorini, “Skema Peningkatan Reciprocity Kanal dengan Menggunakan Metode Hierarchical Clustering”, Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI), Universitas Gajah Mada, Vol: 7, No: 3, pp. 331-337, 2018. [full paper]
16*
Aries Pratiarso, Adam Surya Putra, Prima Kristalina, Amang Sudarsono, Mike Yuliana, I Gede Puja Astawa, “Skema Lokalisasi Posisi Node Terdistribusi pada Lingkungan Free Space Loss”, dipublikasikan pada Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI), Universitas Gajah Mada, Vol.6 No.3, pp. 352-358, 2017. [full paper]
15*
Hary Oktavianto, Amang Sudarsono, Bima Sena Bayu Dewantara, Reni Soelistijorini, Miftahul Huda, Titon Dutono, Takashi Ikeda, “Sebuah Metodologi Pengajaran Pada Eksperimen Pemrosesan Sinyal Digital Menggunakan Modul TMS320VC5402 Dengan Menginvestigasi Orde Filter Maksimum”, EEPIS Journal, Vol: 12, No: 1, ISSN: 0852-2863, pp. 1-7, August, 2007.
14
Cindha Riri Pratiwi, Prima Kristalina, and Amang Sudarsono, “Testbed Secure Indoor Localization System Menggunakan Cluster Based Pathloss Exponential untuk Estimasi Posisi di Lingkungan Indoor Pada Wireless Sensor Network", Prosiding SNITT POLTEKBA, Vol. 3, pp. 63-71, 2018.
13
Adam Surya Putra, Prima Kristalina, and Amang Sudarsono, “Aplikasi Indoor Secured-Localization System Menggunakan Jaringan Sensor Nirkabel untuk Koordinasi Pasukan PMK pada Kondisi Darurat Kebakaran di dalam Gedung", Seminar Nasional Aplikasi Teknologi Informasi (SNATi) 2016.
12
Samsul Huda, Amang Sudarsono, dan Mike Yuliana, “Implementasi Sistem Pengamanan e-Commerce", Indonesia Security Conference 2014 (IDSECCONF2014), KEMKOMINFO, Nov. 1-2, 2014.
11
Samsul Huda, Amang Sudarsono, dan Tri Harsono, “Studi dan Implementasi Keamanan User Privacy Menggunakan CP-ABE", Indonesia Security Conference 2015 (IDSECCONF2015) on E-Government dan Ancaman Keamanan Nasional, KEMKOMINFO, Sept. 5-6, 2015.
10
Haryadi Amran Darwito, Amang Sudarsono, dan Fannush Shofi Akbar, “Implementasi Algoritma Kunci Asimetris Elliptic Curve Cryptography (ECC) Pada Protokol Routing Secure Ad Hoc on Demand Distance Vector (SAODV)", Prosiding SENTIA 2014-Politeknik Negeri Malang, Vol. 6, ISSN: 2085-2347, 2014.
9
Haryadi Amran Darwito, Amang Sudarsono, dan Qoirul Setiawan, “Implementasi Trust CoS dan Trust DSCP pada Jaringan Teleconference Menggunakan Cisco Router", Prosiding SENTIA 2015-Politeknik Negeri Malang, Vol. 7, ISSN: 2085-2347, 2015.
8
Isbat Uzzin Nadhori, Mike Yuliana, dan Amang Sudarsono, “Implementasi Sistem Perlindungan dan Privasi Klien Pada Layanan Apotik Berbasis e-ID", Prosiding SESINDO 2014, ISBN : 978-979-18985-8-4, 2014.
7
Rizal Rahardian, M. Zen S Hadi, dan Amang Sudarsono, “Integrasi Algoritma DES pada Public Key Cryptography untuk Aplikasi Transaksi Online”, Proceeding Industrial Electronic Seminar (IES), ISBN: 978-602-9494-28-0, PENS-ITS Surabaya, pp. 172-176, Oct. 24, 2012.
6
Mochamad Susantok, Amang Sudarsono, Iwan Syarif, “Studi Analisis Pengukuran Performansi dan Kualitas Layanan (QoS) pada Jaringan VoIP Berbasis Session Initiation Protocol (SIP)”, Applied Engineering Seminar (AES), Politeknik Riau, pp. 1-7, Nov. 2007.
5
Nonot Harsono, Stritrusta Sukaridhoto, Ahmad Subhan, Amang Sudarsono, “Teknik Pemetaan Wilayah Secara Cepat Dan Akurat Menggunakan GPS Yang Dikoordinasikan Melalui Jaringan 3G Atau Yang Setara”, Prosiding Konferensi Nasional Teknologi Informasi & Komunikasi untuk Indonesia, 3-4 Mei 2006, Aula Barat & Timur Institut Teknologi Bandung, pp. 467-471, 2006.
4
Nonot Harsono, Stritrusta Sukaridhoto, Ahmad Subhan, Amang Sudarsono, “Rancang Bangun Portable-Data-Entry Untuk Pendataan Sidik Jari Penduduk Menggunakan Embedded System Berbasis Open-Source Dalam Rangka Implementasi E-GOV Indonesia”, Prosiding Konferensi Nasional Teknologi Informasi & Komunikasi untuk Indonesia, 3-4 Mei 2006, Aula Barat & Timur Institut Teknologi Bandung, pp. 15-18, 2006.
3
Nonot Harsono, Stritrusta Sukaridhoto, Ahmad Subhan, Amang Sudarsono, “Model Distributed-Data Processing Berbasis Open-Source Untuk Pengolahan Data Kependudukan Dalam Rangka Implementasi E-GOV Indonesia”, Prosiding Konferensi Nasional Teknologi Informasi & Komunikasi untuk Indonesia, 3-4 Mei 2006, Aula Barat & Timur Institut Teknologi Bandung, pp. 1-5, 2006.
2
Amang Sudarsono, Mochamad Hariadi, and Takafumi Aoki, “LVQ-GVF Snakes Model for Object-Based Segmentation”, Proceeding Industrial Electronic Seminar (IES), ISBN: 979-8689-08-9, PENS-ITS Surabaya, pp. 86-91, Nov. 24, 2005.
1
Nanang Syahroni, Amang Sudarsono, Sritrusta Sukaridhoto, “Sistem Transmisi Informasi SMS Pada Context-Aware Devices”, Proceeding Industrial Electronic Seminar (IES), ISBN: 979-8689-06-2, PENS-ITS Surabaya,  pp. 255-260, Dec. 16, 2003.

Surabaya City
My hometown