Suivre
Mihai-Lica Pura
Mihai-Lica Pura
Independent
Adresse e-mail validée de s.unibuc.ro
Titre
Citée par
Citée par
Année
Modeling and formal verification of implicit on-demand secure ad hoc routing protocols in HLPSL and AVISPA
M Pura, V Patriciu, I Bica
International Journal of Computers and Communications 2 (3), 25-32, 2009
172009
Formal verification of secure ad hoc routing protocols using AVISPA: ARAN case study
ML Pura, VV Patriciu, I Bica
Proceedings of the 4th Conference on European Computing Conference …, 2010
112010
MaRePhoR—An open access machine-readable phonetic dictionary for Romanian
ŞA Toma, A Stan, ML Pura, T Bârsan
2017 International Conference on Speech Technology and Human-Computer …, 2017
92017
On modeling and formally verifying secure explicit on-demand ad hoc routing protocols
ML Pura, I Bica, VV Patriciu
2010 2nd International Conference on Software Technology and Engineering 2 …, 2010
92010
On Anomalous Deformation Profile Detection Through Supervised and Unsupervised Machine Learning
ȘA Toma, S Bogdan, A Focșa, ML Pura
IGARSS 2019-2019 IEEE International Geoscience and Remote Sensing Symposium …, 2019
72019
A Cryptography API: Next Generation Key Storage Provider for Cryptography in the Cloud
I Aciobanitei, PD Urian, M Pura
2018 10th International Conference on Electronics, Computers and Artificial …, 2018
72018
Using cryptography in the cloud for lightweight authentication protocols based on QR codes
I Aciobanitei, IC Buhus, ML Pura
2018 IEEE 12th International Symposium on Applied Computational Intelligence …, 2018
62018
Formal verification of G-PAKE using Casper/FDR2: Securing a group PAKE protocol using Casper/FDR2
ML Pura, VV Patriciu, I Bica
2010 International Conference on Security and Cryptography (SECRYPT), 1-5, 2010
62010
A self-organized key management scheme for ad hoc networks based on identity-based cryptography
ML Pura, D Buchs
2014 10th International Conference on Communications (COMM), 1-4, 2014
42014
Sabres-a proof of concept for enhanced cloud qualified electronic signatures
I Aciobanitei, V Dedita, ML Pura, VV Patriciu
2020 13th International Conference on Communications (COMM), 103-108, 2020
32020
Tiny network intrusion detection system with high performance
AM Avram, ML Pura, SA Toma
2019 11th International Conference on Electronics, Computers and Artificial …, 2019
32019
Hybrid distributed-hierarchical identity based cryptographic scheme for wireless sensor networks
C Grumăzescu, ML Pura, VV Patriciu
New Contributions in Information Systems and Technologies: Volume 1, 949-958, 2015
32015
Symbolic model checking of security protocols for ad hoc networks on any topologies
ML Pura, D Buchs
Transactions on Petri Nets and Other Models of Concurrency X, 109-130, 2015
32015
Model checking ARAN ad hoc secure routing protocol with algebraic Petri nets
ML Pura, D Buchs
2014 10th International Conference on Communications (COMM), 1-4, 2014
32014
Using algebraic petri nets for testing the models of ad hoc secure routing protocols in mobility scenarios
ML Pura, D Buchs
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
32014
Implementing cloud qualified electronic signatures for documents using available cryptographic libraries: a survey
EC Ruica, ML Pura, I Aciobanitei
2020 13th International Conference on Communications (COMM), 113-118, 2020
22020
A BitTorrent DHT Crawler
RG Simion, ML Pura
2019 IEEE 13th International Symposium on Applied Computational Intelligence …, 2019
22019
On the Modelling of Urban Infrastructure Deformation Profiles Using the Applied Element Method and Multiple Hypothesis Testing
B Sebacher, SA Toma, M Lupoae, ML Pura
IGARSS 2018-2018 IEEE International Geoscience and Remote Sensing Symposium …, 2018
22018
IDENTITY-BASED CHRYPTOGRAPHY: FROM PROPOSALS TO EVERYDAY USE.
ML PURA, VV PATRICIU
Scientific Research & Education in the Air Force-AFASES 1, 2014
22014
User Authentication to a Web Site Using Fingerprints
ML PURA
INTERNATIONAL SCIENTIFIC COMMITTEE, 347, 2014
22014
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20