Amang Sudarsono at Electronics Engineering Polytechnic Institute of Surabaya (EEPIS) - ITS, Indonesia

Amang Sudarsono

Division of Telecommunication Engineering, Dept. of Electrical Engineering,
Electronics Engineering Polytechnic Institute of Surabaya (EEPIS),
Kampus ITS Sukolilo, Surabaya 60111, Indonesia, Tel:+6231 594 7280; Fax:+6231 594 6114
E-mail: amang@pens.ac.id

I was in the Graduate School of Natural Science and Technology (GNST), Okayama University, Japan; Graduate School of Information Sciences (GSIS), Tohoku University, Japan; and Sepuluh Nopember Institute of Technology (ITS) Surabaya, Indonesia, respectively. I also was a Network Engineer in the Division of Network Engineering, Metro Cellular Nusantara, Ltd., Surabaya, Indonesia.

My research interests include privacy-enhancing authentications (group signatures), network & information security, and cryptography as well. Currently, we are working on designing privacy preserving for anonymous authentication and its applications in wireless networks.

An Environmental Health Monitoring System through Wireless Sensor Network as a Part of Smart Cities Support
Applied for: Environmental health monitoring system and e-healthcare.

Disseminating latest sensory information of environmental health is one of very important circumstances for everyone. These circumstances should be accessible at anytime and anywhere by everyone. Wireless Sensor Network (WSN) is one of the networks which deals with data sensors distributions from sensor nodes to the gateway node toward a Data Center Server. In this work, we implement an environmental health conditions monitoring system through WSN. In our system, we collect some environmental health information such as temperature, humidity, luminosity, noise, carbon monoxide (CO) and carbon dioxide (CO2) from sensor nodes. The transmitted data sensors are propagated through IEEE802.15.4-based communication toward a gateway which equipped with a small-size storage. Further, the collected data sensors in the gateway are synchronized to the Data Center Server through TCP/IP connection for permanently storing. At anytime and anywhere, all legitimated users are able to access the data sensors through web-based and/or mobile applications from their end devices (e.g., Desktop PCs, Laptop PCs, and Smartphones).

Efficient Proofs of Attributes in Anonymous Credential Systems Using a Pairing-Based Accumulator
Applied for: An Electronic Identity Card (eID).

Anonymous credential system allows the user to convince a verifier of the possession of a certificate issued by an issuer anonymously. A previously proposed system achieves the constant complexity for the number of attributes. However, due to the use of RSA-based cryptography, it still suffers from a high cost computation. In this work, we propose an anonymous credential system with the constant complexity using a pairing-based accumulator and show the practicality of the system in an on-line electronic identity card (eID) application.

An Anonymous On-Demand Routing Protocol Using Pairing-Based Group Signatures
Applied for: An Anonymous Routing Protocol for Mobile Ad-Hoc Networks (MANETs).

Naturally, the communications in the mobile ad-hoc networks (MANETs) are more easily observed for the goal of the network traffic analysis. Hence, to enable anonymous communications from thwarting of such analysis attacks would be strongly desirable. In this work, we introduce an anonymous on-demand routing protocol using pairing-based group signatures. In this protocol, the anonymous communications are achieved by allowing all nodes as valid members of a privilege group to authenticate each other without revealing their own identities throughout an anonymous neighborhood authentication protocol.

A Group Signature Scheme with Efficient Verifier-Local Revocation Check
Applied for: An Anonymous Authentication for On-line Transaction in Mobile Applications.

Recently, verifier-local revocation (VLR) group signature scheme is one of schemes suitable for mobile signers. Unfortunately, the verifier needs to compute R separated pairings for revocation check, where R denotes the number of revoked members. In this work, we propose a VLR group signature scheme with efficient verifier-local revocation check. The efficiency improvement is derived from the observation that the product of pairings can be computed faster than the separated pairings.

Anonymous IEEE802.1X Authentication System Using Group Signatures
Applied for: An Anonymous Authentication for Wireless-ISPs.

Recently, ubiquitous Internet-access services have been provided by Internet service providers (ISPs) by deploying wireless local area networks (LANs) in public spaces including stations, hotels, and coffee shops. The IEEE802.1X protocol is usually used for user authentications to allow only authorized users to access services. Then, although user personal information of access locations, services, and operations can be easily collected by ISPs and thus, their strict management has been demanded, it becomes very difficult when multiple ISPs provide roaming services by their corporations. In this work, we present an anonymous IEEE802.1X authentication system using a group signature scheme to allow user authentication without revealing their identities. Without user identities, ISPs cannot collect personal information. As an efficient revocable group signature scheme, we adopt the verifier-local revocation (VLR) type with some modifications for use of the fast pairing computation. We show the implementation of our proposal and evaluation results where the practicality of our system is confirmed for up to 1,000 revoked users.

A Study of Pairing-Based Anonymous Authentication Systems and Their Applications.
In Japanese: ペアリングを用いた匿名認証システムとその応用に関する研究。
Read Phonetically: Pea ringu o mochiita tokumei ninshō shisutemu to sono ōyō ni kansuru kenkyū.
Graduate School of Natural Science and Technology, Okayama University, Japan, March, 2011.
[pdf file]

Journals:
25
Amang Sudarsono and Toru Nakanishi, “A Secure Data Exchange System in Wireless Delay Tolerant Network Using Attribute-Based Encryption”, Journal of Information Processing, Vol. 25, pp. 234-243, Feb., 2017. [abstract and full paper]
24
Rizky Pratama Hudhajanto, I Gede Puja Astawa, and Amang Sudarsono, “Performance Comparison of Coded and Uncoded MIMO-OFDM with Linear and Non-Linear Detector”, Indian Journal of Science and Technology, Vol. 9, Issue 48, pp. 1-7, Dec., 2016. [full paper]
23
Novita Astin, I Gede Puja Astawa, and Amang Sudarsono, “Performance Analysis of Video Transmission Using Sequential Distortion Minimization Method for Digital Video Broadcasting Terrestrial”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2443-1168, Vol. 4, No. 2, pp. 291-307, Dec., 2016. [full paper]
22
Muh. Alfan Taufiqurrahman, I Gede Puja Astawa, and Amang Sudarsono, “Performance Analysis of Circular 8-QAM Constellation with MMSE Equalizer for OFDM System Using USRP”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2443-1168, Vol. 4, No. 2, pp. 259-276, Dec., 2016. [full paper]
21
R. Gaguk Pratama Yudha, I Gede Puja Astawa, and Amang Sudarsono, “Performance Analysis of CP-Based and CAZAC Training Sequence-Based Synchronization in OFDM System”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2443-1168, Vol. 4, No. 2, pp. 221-236, Dec., 2016. [full paper]
20
Nurul Fahmi, M. Udin Harun Al Rasyid, and Amang Sudarsono, “Adaptive Sleep Scheduling for Health Monitoring System Based on the IEEE 802.15.4 Standard”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2443-1168, Vol. 4, No. 1, pp. 91-114, June, 2016. [full paper]
19
Samsul Huda, Amang Sudarsono, and Tri Harsono, “Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2443-1168, Vol. 4, No. 1, pp. 115-140, June, 2016. [full paper]
18
Rizky Pratama Hudhajanto, I Gede Puja Astawa, and Amang Sudarsono, “Covert Communication in MIMO-OFDM System Using Pseudo Random Location of Fake Subcarriers”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2443-1168, Vol. 4, No. 1, pp. 150-163, June, 2016. [full paper]
17
Samsul Huda, Nurul Fahmi, Amang Sudarsono, and M. Udin Harun Al Rasyid, “Secure Data Sensor Sharing on Ubiquitous Environmental Health Monitoring Application”, Jurnal Teknologi (Sciences & Engineering) 78:6-3 (2016), pp. 53-58, 2016. [full paper]
16
Amang Sudarsono, Samsul Huda, Nurul Fahmi, M. Udin Harun Al Rasyid, and Prima Kristalina, “Secure Data Exchange in Environmental Health Monitoring System through Wireless Sensor Network”, International Journal of Engineering and Technology Innovation (IJETI), Vol. 6, No. 2, pp. 103-122, Taiwan, March, 2016 [Scopus]. [full paper]
15
M. Udin Harun Al Rasyid, Isbat Uzzin Nadhori, Amang Sudarsono, and Yodhista Tulus Alnovinda, “Pollution Monitoring System Using Gas Sensor based on Wireless Sensor Network”, International Journal of Engineering and Technology Innovation (IJETI), Vol. 6, No. 1, pp. 79-91, Taiwan, Dec. 2015 [Scopus]. [full paper]
14
M. Udin Harun Al Rasyid, Bih-Hwang Lee, and Amang Sudarsono, “Partition-Based GTS Adjustment for Wireless Sensor Networks”, Journal of ICT Research and Applications ITB, Vol. 9, No. 2, pp. 162-176, 2015 [Scopus]. [full paper]
13
Ahmad Zainudin, Amang Sudarsono, and Kevin Prima Pambudi, “Performance Analysis of DTN Using Level Signal Priority Epidemic Routing Protocol”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 3, No. 2, December, 2015. [full paper]
12
Amang Sudarsono, Anang Siswanto, Heru Iswanto, and Qoirul Setiawan, “Traffic Analysis of Quality of Service (QoS) for Video Conferencing between Main Campus and Sub Campus in Laboratory Scale”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 3, No. 2, pp. 1-17, December, 2015. [full paper]
11
Hendy Briantoro, I Gede Puja Astawa, and Amang Sudarsono, “An Implementation of Error Minimization Data Transmission in OFDM using BCH Code and Convolutional Code”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 3, No. 2, December, 2015. [full paper]
10
Mike Yuliana, Ghandra Awaludinsyah, Aries Pratiarso, and Amang Sudarsono, “Design and Implementation of a Secured Personal Identity Based ECC and ECDSA: An Inpatient System”, European Scientific Journal, Vol. 11, No. 21, ISSN: 1857-7881 (Print) e-ISSN 1857-7431, pp. 473-483, July, 2015.
9
Zakha Maisat Eka Darmawan, M. Udin Harun Al Rasyid, and Amang Sudarsono, “Modified GTS Allocation Scheme for IEEE 802.15.4”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 3, No. 1, pp. 81-91, June, 2015. [full paper]
8
M. Udin Harun Al Rasyid, Bih-Hwang Lee, Amang Sudarsono, and Taufiqurrahman, “Implementation of Body Temperature and Pulseoximeter Sensors for Wireless Body Area Network”, Sensors and Materials, International Journal on Sensor Technology [SCIE, Scopus], ISSN 0914-4935, Vol. 27, No. 8, pp. 727-732, Feb., 2015.
7
Vivien Arief Wardhany, Sritrusta Sukaridhoto, and Amang Sudarsono, “Indonesian Automatic Speech Recognition for Command Speech Controller Multimedia Player”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 2, No. 2, pp. 39-48, Dec, 2014. [full paper]
6
Mike Yuliana, Isbat Uzzin Nadhori, and Amang Sudarsono, “RFID Technology for Securing e-Health System: Service of Consulting a Doctor”, European Scientific Journal, Vol. 10, No. 27, ISSN: 1857-7881 (Print) e-ISSN 1857-7431, pp. 95-104, Sept., 2014.
5
Indah Yulia Prafitaning Tiyas, Ali Ridho Barakbah, Tri Harsono, and Amang Sudarsono, “Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 2, No. 1, pp. 39-49, June, 2014. [full paper]
4
Ahmad Zainudin, Amang Sudarsono, and I Gede Puja Astawa, “Performance Analysis of An OFDM PHY Scheme with Zero Forcing Equalizer Using Software Defined Radio Platform and USRP”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 2, No. 1, pp. 26-38, June, 2014. [full paper]
3
Ismed Jauhar, Amang Sudarsono, and Mike Yuliana, “Secure Ubiquitous Sensor Network Based on Elliptic Curve Menezes Qu Vanstone as Status Data Supply of Environment in Disaster Management”, Emitter International Journal of Engineering Technology, EEPIS Press ISSN: 2355-391X, Vol. 1, No. 1, pp. 1-10, Dec., 2013. [full paper]
2
Amang Sudarsono, Toru Nakanishi, and Nobuo Funabiki, “A Pairing-Based Anonymous Credential System with Efficient Attribute Proofs”, Journal of Information Processing, Vol. 20, No. 3, pp. 774-784, July, 2012 (Recommended paper). [abstract and full paper]
1
Amang Sudarsono, Toru Nakanishi, Yasuyuki Nogami, and Nobuo Funabiki, “Anonymous IEEE802.1X Authentication System Using Group Signatures”, Journal of Information Processing, Vol. 18, pp. 63-76, March, 2010. [abstract and full paper]
Conference Papers:

2016
11
Bagas Mardiasyah Prakoso, Pristy Ar Nurisysyifak, Muhammad Arsyad, Andryan Bagoes Noegroho, Amang Sudarsono, and Ahmad Zainudin, “Performance Analysis of OLSR Routing for Secure Medical Data Transmission for Rural Areas with Delay Tolerant Network”, International Symposium on Electronics and Smart Devices (ISESD 2016), November 29-30, Bandung, 2016.
10
Cindha Pratiwi, Prima Kristalina, and Amang Sudarsono, “Cluster-Based Pathloss Exponential Modeling for Indoor Positioning in Wireless Sensor Network”, The Fifth International Conference on Knowledge Creation and Intelligent Computing (KCIC), pp. 53-59, Nov., 15-17, Manado, 2016.
9
Munsyi, Amang Sudarsono, and M. Udin Harun Al Rasyid, “Secure Data Sensor Access Using Attribute-Based Encryption with Revocation for Environmental Monitoring”, The Fifth International Conference on Knowledge Creation and Intelligent Computing (KCIC), pp. 73-79, Nov., 15-17, Manado, 2016.
8
Rafina Destiarti Ainul, Prima Kristalina, and Amang Sudarsono, “Mobile Cooperative Tracking with RSSI Ranging in EKF Algorithm for Indoor Wireless Sensor Network”, The Fifth International Conference on Knowledge Creation and Intelligent Computing (KCIC), pp. 60-66, Nov., 15-17, Manado, 2016.
7
Rafina Destiarti Ainul, Prima Kristalina, and Amang Sudarsono, “Cluster-Based PLE Areas for Mobile Cooperative Localization in Indoor Wireless Sensor Network”, The 8th 2016 International Conference on Information Technology and Electrical Engineering (ICITEE), Oct. 5-6, 2016.
6
Prima Kristalina, Amang Sudarsono, Mohammad Syafrudin, and Bimantara Ksatria Putra, “SCLoc: Secure Localization Platform for Indoor Wireless Sensor Network”, International Electronic Symposium (IES), pp. 424-429, Bali, Sept. 29-30, 2016.
5
Ahmad Zainudin, Amang Sudarsono, and Bagas Mardiasyah Prakoso, “An Implementation of Secure Medical Data Delivery for Rural Areas Through Delay Tolerant Network”, International Electronic Symposium (IES), pp. 418-423, Bali, Sept. 29-30, 2016.
4
Amang Sudarsono, M. Udin Harun Al Rasyid, and Mike Yuliana, “An Implementation of Anonymous Authentication System in Wireless Sensor Network Using VLR Group Signature”, International Electronic Symposium (IES), pp. 281-286, Bali, Sept. 29-30, 2016.
3
Amang Sudarsono and M. Udin Harun Al Rasyid, “An Anonymous Authentication System in Wireless Networks Using Verifier-Local Revocation Group Signature Scheme”, International Seminar on Intelligent Technology and Its Applications (ISITIA), pp. 49-54, Jul. 28–30, 2016.
2
M. Udin Harun Al Rasyid, Achmad Sayfudin, Arif Basofi, and Amang Sudarsono, “Development of Semantic Sensor Web For Monitoring Environment Conditions”, International Seminar on Intelligent Technology and Its Applications (ISITIA), pp. 611-615, Jul. 28–30, 2016.
1
M. Udin Harun Al Rasyid, Alif Akbar Pranata, Bih-Hwang Lee, Ferry Astika Saputra, and Amang Sudarsono, “Portable Electrocardiogram Sensor Monitoring System Based On Body Area Network”, IEEE International Conference on Consumer Electronics – Taiwan (ICCE-TW), May 27-29, 2016.

2015
11
Nurul Fahmi, Samsul Huda, M. Udin Harun Al Rasyid, and Amang Sudarsono, “Fuzzy Logic for An Implementation Environment Health Monitoring System Based on Wireless Sensor Network”, 2015 Recent Advancement in Informatics, Electrical and Electronics Engineering International Conference (RAIEIC2015), Medan, Dec. 10–12, 2015.
10
Samsul Huda, Nurul Fahmi, Amang Sudarsono, and M. Udin Harun Al Rasyid, “Secure Data Sensor Sharing on Ubiquitous Environmental Health Monitoring Application”, 2015 Recent Advancement in Informatics, Electrical and Electronics Engineering International Conference (RAIEIC2015), Medan, Dec. 10–12, 2015.
9
Amang Sudarsono and Toru Nakanishi, “An Implementation of Secure Data Exchange System with Multi-hop Routing in Wireless Delay Tolerant Network Using Attribute-Based Encryption”, 3rd International Symposium on Computing and Networking (CANDAR 2015), pp. 470-476, Dec. 8-11, Sapporo, Hokkaido, Japan, 2015.
8
Mike Yuliana, Aries Pratiarso, and Amang Sudarsono, “Proof of Attributes Based CL Signature Scheme on e-Health Applications”, International Conference on Science in Information Technology (ICSITech) 2015, pp. 253-258, Oct. 27-28, Yogyakarta, Indonesia, 2015.
7
Amang Sudarsono, Prima Kristalina, M. Udin Harun Al Rasyid, and Rony Hermawan, “An Implementation of Secure Data Sensor Transmission in Wireless Sensor Network for Monitoring Environmental Health”, International Conference on Computer, Control, Informatics and its Applications (IC3INA) 2015, pp. 94-99, Oct. 5-7, Bandung, Indonesia, 2015.
6
M. Udin Harun Al Rasyid, Amang Sudarsono, Idris Winarno, and Dika Dwi Hari Rupawan, “Guaranteed Time Slot Allocation Method for IEEE 802.15.4 Wireless Sensor Network”, International Conference on Computer, Control, Informatics and its Applications (IC3INA) 2015, pp. 86-89, Oct. 5-7, Bandung, Indonesia, 2015.
5
M. Udin Harun Al Rasyid, Bih-Hwang Lee, and Amang Sudarsono, “Wireless Body Area Network for Monitoring Body Temperature, Heart Beat and Oxygen in Blood”, International Seminar on Intelligent Technology and Its Applications (ISITIA), pp. 93-96, May 20, Surabaya, Indonesia, 2015.
4
M. Udin Harun Al Rasyid, Bih-Hwang Lee, Amang Sudarsono, and Imam Mahfud, “Monitoring System of Patient Position Based On Wireless Body Area Sensor Network”, IEEE International Conference on Consumer Electronics – Taiwan (ICCE-TW), June 6-8, NTUST Taipei Taiwan, 2015.
3
Vivien Arief Wardhany, Muhammad Hendrick Kurnia, Sritrusta Sukaridhoto, Amang Sudarsono, and Dadet Pramadihanto, “Smart Presentation System using Hand Gestures and Indonesian Speech Command”, 2015 International Electronics Symposium (IES 2015), pp. 74-78, Sept. 29-30, Surabaya, 2015.
2
Samsul Huda, Amang Sudarsono, and Tri Harsono, “Secure Data Exchange using Authenticated Ciphertext-Policy Attributed-Based Encryption”, 2015 International Electronics Symposium (IES 2015), pp. 140-145, Sept. 29-30, Surabaya, 2015.
1
Asif Ali Zamzami, Ega Devara, Joni Pramana, Amang Sudarsono, and Ahmad Zainudin, “Reliability Analysis of GSM Network Using Software Defined Radio-Based System”, 2015 International Electronics Symposium (IES 2015), pp. 280-285, Sept. 29-30, Surabaya, 2015.

2014
8
Amang Sudarsono and Toru Nakanishi, “An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption”, 2nd International Symposium on Computing and Networking (CANDAR 2014), pp. 536-542, Dec. 10-12, Shizuoka, Japan, 2014.
7
M. Udin Harun Al Rasyid, Amang Sudarsono, and Bih-Hwang Lee, “The study of pulse oxygen and body temperature sensor for e-health application”, The 3rd International Conference on Engineering and Technology Innovation (ICETI) 2014, Oct. 31 - Nov. 4, Kenting Taiwan, 2014.
6
Amang Sudarsono, M. Udin Harun Al Rasyid, and Hendhi Hermawan, “An Implementation of Secure Wireless Sensor Network for e-Healthcare System”, International Conference on Computer, Control, Informatics and its Applications (IC3INA) 2014, pp. 75-80, Oct. 21-23, Bandung, Indonesia, 2014.
5
M. Udin Harun Al Rasyid, Isbat Uzzin Nadhori, Amang Sudarsono, and Ridho Luberski, “Analysis of Slotted and Unslotted CSMA/CA Wireless Sensor Network for e-Healthcare System”, International Conference on Computer, Control, Informatics and its Applications (IC3INA) 2014, pp. 59-63, Oct. 21-23, Bandung, Indonesia, 2014.
4
Mike Yuliana, Amang Sudarsono, and Isbat Uzzin Nadhori, “Protection System of Client's Privacy on e-Health Services”, The 8th International Conference on Information & Communication Technology and Systems (ICTS) 2014, Sep. 24-25, Surabaya, Indonesia, 2014.
3
Amang Sudarsono, Sritrusta Sukaridhoto, Toru Nakanishi, and Nobuo Funabiki, “Secure Content Exchange in Delay Tolerant Networks Using Attribute-Based Encryption”, Proceeding of The 3rd Indonesian-Japanese Conference on Knowledge Creation & Intelligent Computing 2014 (KCIC2014), pp. 35-43, Mar. 25-26, Malang, Indonesia, 2014.
2
Indah Yulia Prafitaning Tiyas, Ali Ridho Barakbah, Tri Harsono, and Amang Sudarsono, “Intrusion Detection with On-Line Clustering Using Reinforcement Learning”, Proceeding of The 3rd Indonesian-Japanese Conference on Knowledge Creation & Intelligent Computing 2014 (KCIC2014), pp. 50-57, Mar. 25-26, Malang, Indonesia, 2014.
1
Ahmad Zainudin, I Gede Puja Astawa, Amang Sudarsono, and Yoedy Moegiharto, “A Comparison of CP-OFDM Schemes Performance Using SDR-based Experimental Testbed”, International Electronics Symposium (IES) 2014, ISBN: 978-602-0917-14-6, pp. 145-150, Dec., Surabaya, 2014.

2013
5
M. Udin Harun Al Rasyid, Bih-Hwang Lee, and Amang Sudarsono, “PEGAS: Partitioned GTS Allocation Scheme for IEEE 802.15.4 Networks”, International Conference on Computer, Control, Informatics and its Applications (IC3INA) 2013, Nov. 19-20, Jakarta, Indonesia, 2013.
4
Ahmad Zainudin, Amang Sudarsono, and I Gede Puja Astawa, “Reliability Analysis of Digital Communication for Various Data Types Transmission Using GNU Radio and USRP”, Proceeding of The 15th Industrial Electronics Seminar 2013 (IES2013), pp. 91-96, Oct. 23, Surabaya, Indonesia, 2013.
3
Amang Sudarsono, “Anonymous On-Demand Routing Protocol Using Pairing-Based Group Signature”, Proceeding of The 15th Industrial Electronics Seminar 2013 (IES2013), pp. 76-84, Oct. 23, Surabaya, Indonesia, 2013.
2
Zakha Maisat Eka Darmawan, M. Udin Harun Al Rasyid, and Amang Sudarsono, “Throughput Performance of a Beacon Enabled IEEE802.15.4 Star with Guaranteed Time Slot”, Proceeding of The 15th Industrial Electronics Seminar 2013 (IES2013), pp. 126-129, Oct. 23, Surabaya, Indonesia, 2013.
1
Amang Sudarsono and Mike Yuliana, “A Light-Weight Group Signature Scheme for Wireless Networks Based-on BBS Short Group Signature”, Proceeding of The 2nd Indonesian-Japanese Conference on Knowledge Creation & Intelligent Computing 2013 (KCIC2013), pp. 93-98, Mar. 20-21, Bali, Indonesia, 2013.

2012
1
Amang Sudarsono and Mike Yuliana, “An Implementation of Digital Signature and Key Agreement on IEEE802.15.4 WSN Embedded Device”, Proceeding of The 14th Industrial Electronics Seminar 2012 (IES2012), pp. 115-120, Oct. 24, Surabaya, Indonesia, 2012.

2011
2
Amang Sudarsono, Toru Nakanishi, and Nobuo Funabiki, “An Implementation of a Pairing-Based Anonymous Credential System with Constant Complexity”, Proceeding of The International Multi Conference of Engineers and Computer Scientists 2011 (IMECS2011), pp. 630-635, March 16-18, Hong Kong, 2011. [pdf file]
1
Amang Sudarsono, Toru Nakanishi, and Nobuo Funabiki, “Efficient Proofs of Attributes in Pairing-Based Anonymous Credential System”, Proceeding of The 11th Privacy Enhancing Technologies Symposium (PETS2011), LNCS 6794, Springer-Verlag, pp. 246-263, July, Waterloo, Canada, 2011. [abstract][pdf file]

2010
3
Amang Sudarsono, Toru Nakanishi, and Nobuo Funabiki, “Efficient Proofs of Attributes in Anonymous Credential Systems Using a Pairing-Based Accumulator”, Proceeding of Computer Security Symposium 2010 (CSS2010), pp. 801-806, 2010.
2
Masamitsu Sato, Amang Sudarsono, Toru Nakanishi, and Nobuo Funabiki, “An Implementation of An Anonymous IEEE802.1X Authentication Protocol with Collaborations among Organizations”, Proceeding of Computer Security Symposium 2010 (CSS2010), pp. 285-290, 2010.
1
Amang Sudarsono, Toru Nakanishi, and Nobuo Funabiki, “An Implementation of a Pairing-Based Anonymous Credential System with Constant Complexity”, Proceeding of IEICE Tech. Rep., vol. 110, no. 339, NS2010-135, pp. 179-184, 2010. [abstract]

2009
2
Amang Sudarsono, Toru Nakanishi, Yumi Sakemi, Yasuyuki Nogami, and Nobuo Funabiki, “An Implementation of a Group Signature Scheme with Efficient Verifier-Local Revocation Check”, IEICE Tech. Rep., vol. 109, no. 42, ISEC2009-6, pp. 37-42, May 22, 2009. [abstract]
1
Toru Nakanishi, Amang Sudarsono, Yumi Sakemi, Yasuyuki Nogami, and Nobuo Funabiki, “A Group Signature Scheme with Efficient Verifier-Local Revocation Check”, Proceeding of The 2009 Symposium on Cryptography and Information Security (SCIS 2009), Otsu, Japan, 2B4-2, Jan 20-23, 2009. [abstract&intro]

2008
2
Amang Sudarsono, Toru Nakanishi, Yasuyuki Nogami, and Nobuo Funabiki, “An Implementation of Anonymous IEEE802.1X Authentication System for Wireless Networks”, Proceeding of The 10th Industrial Electronic Seminar 2008, Network and Communication System Session, Electronics Engineering Polytechnic Institute of Surabaya (EEPIS), Surabaya, Indonesia, pp. 23-30, October 30, 2008.
1
Amang Sudarsono, Toru Nakanishi, Kouhei Miki and Nobuo Funabiki, “An Implementation of Anonymous IEEE802.1X Authentication with User Revocation”, The 3rd Joint Workshop on Information Security (JWIS 2008), July 10-11, Hanyang University, Seoul, Korea. pp. 112-125, 2008.

Others:
*
Hary Oktavianto, Amang Sudarsono, Bima Sena Bayu Dewantara, Reni Soelistijorini, Miftahul Huda, Titon Dutono, Takashi Ikeda, “Sebuah Metodologi Pengajaran Pada Eksperimen Pemrosesan Sinyal Digital Menggunakan Modul TMS320VC5402 Dengan Menginvestigasi Orde Filter Maksimum”, EEPIS Journal, Vol: 12, No: 1, ISSN: 0852-2863, pp. 1-7, August, 2007.
13
Adam Surya Putra, Prima Kristalina, and Amang Sudarsono, “Aplikasi Indoor Secured-Localization System Menggunakan Jaringan Sensor Nirkabel untuk Koordinasi Pasukan PMK pada Kondisi Darurat Kebakaran di dalam Gedung", Seminar Nasional Aplikasi Teknologi Informasi (SNATi) 2016.
12
Samsul Huda, Amang Sudarsono, dan Mike Yuliana, “Implementasi Sistem Pengamanan e-Commerce", Indonesia Security Conference 2014 (IDSECCONF2014), KEMKOMINFO, Nov. 1-2, 2014.
11
Samsul Huda, Amang Sudarsono, dan Tri Harsono, “Studi dan Implementasi Keamanan User Privacy Menggunakan CP-ABE", Indonesia Security Conference 2015 (IDSECCONF2015) on E-Government dan Ancaman Keamanan Nasional, KEMKOMINFO, Sept. 5-6, 2015.
10
Haryadi Amran Darwito, Amang Sudarsono, dan Fannush Shofi Akbar, “Implementasi Algoritma Kunci Asimetris Elliptic Curve Cryptography (ECC) Pada Protokol Routing Secure Ad Hoc on Demand Distance Vector (SAODV)", Prosiding SENTIA 2014-Politeknik Negeri Malang, Vol. 6, ISSN: 2085-2347, 2014.
9
Haryadi Amran Darwito, Amang Sudarsono, dan Qoirul Setiawan, “Implementasi Trust CoS dan Trust DSCP pada Jaringan Teleconference Menggunakan Cisco Router", Prosiding SENTIA 2015-Politeknik Negeri Malang, Vol. 7, ISSN: 2085-2347, 2015.
8
Isbat Uzzin Nadhori, Mike Yuliana, dan Amang Sudarsono, “Implementasi Sistem Perlindungan dan Privasi Klien Pada Layanan Apotik Berbasis e-ID", Prosiding SESINDO 2014, ISBN : 978-979-18985-8-4, 2014.
7
Rizal Rahardian, M. Zen S Hadi, dan Amang Sudarsono, “Integrasi Algoritma DES pada Public Key Cryptography untuk Aplikasi Transaksi Online”, Proceeding Industrial Electronic Seminar (IES), ISBN: 978-602-9494-28-0, PENS-ITS Surabaya, pp. 172-176, Oct. 24, 2012.
6
Mochamad Susantok, Amang Sudarsono, Iwan Syarif, “Studi Analisis Pengukuran Performansi dan Kualitas Layanan (QoS) pada Jaringan VoIP Berbasis Session Initiation Protocol (SIP)”, Applied Engineering Seminar (AES), Politeknik Riau, pp. 1-7, Nov. 2007.
5
Nonot Harsono, Stritrusta Sukaridhoto, Ahmad Subhan, Amang Sudarsono, “Teknik Pemetaan Wilayah Secara Cepat Dan Akurat Menggunakan GPS Yang Dikoordinasikan Melalui Jaringan 3G Atau Yang Setara”, Prosiding Konferensi Nasional Teknologi Informasi & Komunikasi untuk Indonesia, 3-4 Mei 2006, Aula Barat & Timur Institut Teknologi Bandung, pp. 467-471, 2006.
4
Nonot Harsono, Stritrusta Sukaridhoto, Ahmad Subhan, Amang Sudarsono, “Rancang Bangun Portable-Data-Entry Untuk Pendataan Sidik Jari Penduduk Menggunakan Embedded System Berbasis Open-Source Dalam Rangka Implementasi E-GOV Indonesia”, Prosiding Konferensi Nasional Teknologi Informasi & Komunikasi untuk Indonesia, 3-4 Mei 2006, Aula Barat & Timur Institut Teknologi Bandung, pp. 15-18, 2006.
3
Nonot Harsono, Stritrusta Sukaridhoto, Ahmad Subhan, Amang Sudarsono, “Model Distributed-Data Processing Berbasis Open-Source Untuk Pengolahan Data Kependudukan Dalam Rangka Implementasi E-GOV Indonesia”, Prosiding Konferensi Nasional Teknologi Informasi & Komunikasi untuk Indonesia, 3-4 Mei 2006, Aula Barat & Timur Institut Teknologi Bandung, pp. 1-5, 2006.
2
Amang Sudarsono, Mochamad Hariadi, and Takafumi Aoki, “LVQ-GVF Snakes Model for Object-Based Segmentation”, Proceeding Industrial Electronic Seminar (IES), ISBN: 979-8689-08-9, PENS-ITS Surabaya, pp. 86-91, Nov. 24, 2005.
1
Nanang Syahroni, Amang Sudarsono, Sritrusta Sukaridhoto, “Sistem Transmisi Informasi SMS Pada Context-Aware Devices”, Proceeding Industrial Electronic Seminar (IES), ISBN: 979-8689-06-2, PENS-ITS Surabaya,  pp. 255-260, Dec. 16, 2003.

Surabaya City
My hometown