4   Artículos

 
en línea
Inka Trisna Dewi, Amang Sudarsono, Prima Kristalina, Mike Yuliana     Pág. 140 - 160
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic scheme that requires the distribution of shared secret keys. To reduce attacks on key distribution, physical layer-based key formation schemes that utilize ... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Aries Pratiarso, Prima Kristalina     Pág. 153 - 163
In wireless sensor network applications, the position of nodes is randomly distributed following the contour of the observation area. A simple solution without any measurement tools is provided by range-free method. However, this method yields the coarse... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »