Follow
Eko Fajar Cahyadi
Eko Fajar Cahyadi
Institut Teknologi Telkom Purwokerto
Verified email at ittelkom-pwt.ac.id - Homepage
Title
Cited by
Cited by
Year
Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications
SF Chiou, HT Pan, EF Cahyadi, MS Hwang
International Journal of Network Security 21 (1), 100-104, 2019
232019
A certificateless aggregate signature scheme for security and privacy protection in VANET
EF Cahyadi, TW Su, CC Yang, MS Hwang
International Journal of Distributed Sensor Networks 18 (5), 15501329221080658, 2022
182022
A comprehensive survey on certificateless aggregate signature in vehicular ad hoc networks
EF Cahyadi, MS Hwang
IETE Technical Review 39 (6), 1265-1276, 2022
172022
An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs
EF Cahyadi, MS Hwang
Plos one 16 (9), e0257044, 2021
112021
Analisis Perbandingan Performasi Protokol Routing AODV dan DSR pada Mobile Ad-Hoc Network (MANET)
SD Anggraini, K Nugroho, EF Cahyadi
Prosiding 2nd Seminar Nasional IPTEK Terapan (SENIT) 2017 2 (1), 112-118, 2017
112017
An Improvement of the Remote Authentication Scheme for Anonymous Users Using an Elliptic Curve Cryptosystem
MS Hwang, EF Cahyadi, CY Yang, SF Chiou
IEEE 4th International Conference on Computer and Communications (IEEE ICCC …, 2018
92018
Simulasi dan Analisis QoS Video Conference melalui Jaringan Interworking IMS-UMTS menggunakan OPNET
D Pranindito, P Pattinasarani, EF Cahyadi
Jurnal Infotel 9 (1), 147-157, 2017
92017
Research on Batch Verification Schemes for Identifying Illegal Signatures
HT Pan, EF Cahyadi, SF Chiou, MS Hwang
International Journal of Network Security 21 (6), 1062-1070, 2019
82019
Research on identity-based batch verification schemes for security and privacy in VANETs
EF Cahyadi, C Damarjati, MS Hwang
Journal of Electronic Science and Technology 20 (3), 1-19, 2022
62022
Forecasting air quality using massive-scale wsn based on convolutional LSTM network
KT Putra, EF Cahyadi, AS Mamonto, SS Berutu, S Muharom
2021 1st International Conference on Electronic and Electrical Engineering …, 2021
62021
Cryptanalysis of Kumar's Remote User Authentication Scheme with Smart Card
MS Hwang, EF Cahyadi, YC Chou, CY Yang
2018 14th International Conference on Computational Intelligence and …, 2018
52018
Assessing Readiness of IP Networks to Support H.323 Desktop Videoconferencing Services over Various Scheduling Techniques using OPNET
EF Cahyadi, H Nusantara
Electrical Power, Electronics, Communications, Controls and Informatics …, 2014
52014
An improved efficient authentication scheme for vehicular ad hoc networks with batch verification using bilinear pairings
EF Cahyadi, MS Hwang
International Journal of Embedded Systems 15 (2), 139-148, 2022
42022
The study on the key management and billing for wireless sensor networks
EF Cahyadi, CY Yang, NI Wu, MS Hwang
Int J Netw Secur 23 (6), 937-951, 2021
42021
An improved Chang-Lee’s smart card-based authentication scheme
SF Chiou, EF Cahyadi, CY Yang, MS Hwang
Journal of Physics: Conference Series 1237 (4), 042044, 2019
42019
Analisa Karakteristik Teori Antrian pada Jaringan IP Multimedia Subsystem (IMS) menggunakan OPNET Modeler 14.5
EF Cahyadi, RD Cahyani, A Hikmaturokhman
Jurnal Infotel 7 (1), 15-22, 2015
42015
Analisis Pengaruh Kecepatan Mobilitas User Terhadap QoS di WLAN menggunakan OPNET Modeler
A Hikmaturokhman, N Fatonah, EF Cahyadi
Proceeding SENDI_U, 2015
42015
A lightweight BT-based authentication scheme for illegal signatures identification in VANETs
EF Cahyadi, MS Hwang
IEEE Access 10, 133869-133882, 2022
32022
Reviews and analyses the privacy-protection system for multi-server
MS Hwang, EF Cahyadi, SF Chiou, CY Yang
Journal of Physics: Conference Series 1237 (2), 022091, 2019
32019
The QoS Trade-off in IEEE 802.11n EDCA and DCF for Voice, Video, and Data Traffic
EF Cahyadi, MR Raihan, AR Danisya, MS Hwang
IEEE International Conference on Consumer Electronics – Taiwan (ICCE-TW …, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20