Modeling and formal verification of implicit on-demand secure ad hoc routing protocols in HLPSL and AVISPA M Pura, V Patriciu, I Bica International Journal of Computers and Communications 2 (3), 25-32, 2009 | 17 | 2009 |
Formal verification of secure ad hoc routing protocols using AVISPA: ARAN case study ML Pura, VV Patriciu, I Bica Proceedings of the 4th Conference on European Computing Conference …, 2010 | 11 | 2010 |
MaRePhoR—An open access machine-readable phonetic dictionary for Romanian ŞA Toma, A Stan, ML Pura, T Bârsan 2017 International Conference on Speech Technology and Human-Computer …, 2017 | 9 | 2017 |
On modeling and formally verifying secure explicit on-demand ad hoc routing protocols ML Pura, I Bica, VV Patriciu 2010 2nd International Conference on Software Technology and Engineering 2 …, 2010 | 9 | 2010 |
On Anomalous Deformation Profile Detection Through Supervised and Unsupervised Machine Learning ȘA Toma, S Bogdan, A Focșa, ML Pura IGARSS 2019-2019 IEEE International Geoscience and Remote Sensing Symposium …, 2019 | 7 | 2019 |
A Cryptography API: Next Generation Key Storage Provider for Cryptography in the Cloud I Aciobanitei, PD Urian, M Pura 2018 10th International Conference on Electronics, Computers and Artificial …, 2018 | 7 | 2018 |
Using cryptography in the cloud for lightweight authentication protocols based on QR codes I Aciobanitei, IC Buhus, ML Pura 2018 IEEE 12th International Symposium on Applied Computational Intelligence …, 2018 | 6 | 2018 |
Formal verification of G-PAKE using Casper/FDR2: Securing a group PAKE protocol using Casper/FDR2 ML Pura, VV Patriciu, I Bica 2010 International Conference on Security and Cryptography (SECRYPT), 1-5, 2010 | 6 | 2010 |
A self-organized key management scheme for ad hoc networks based on identity-based cryptography ML Pura, D Buchs 2014 10th International Conference on Communications (COMM), 1-4, 2014 | 4 | 2014 |
Sabres-a proof of concept for enhanced cloud qualified electronic signatures I Aciobanitei, V Dedita, ML Pura, VV Patriciu 2020 13th International Conference on Communications (COMM), 103-108, 2020 | 3 | 2020 |
Tiny network intrusion detection system with high performance AM Avram, ML Pura, SA Toma 2019 11th International Conference on Electronics, Computers and Artificial …, 2019 | 3 | 2019 |
Hybrid distributed-hierarchical identity based cryptographic scheme for wireless sensor networks C Grumăzescu, ML Pura, VV Patriciu New Contributions in Information Systems and Technologies: Volume 1, 949-958, 2015 | 3 | 2015 |
Symbolic model checking of security protocols for ad hoc networks on any topologies ML Pura, D Buchs Transactions on Petri Nets and Other Models of Concurrency X, 109-130, 2015 | 3 | 2015 |
Model checking ARAN ad hoc secure routing protocol with algebraic Petri nets ML Pura, D Buchs 2014 10th International Conference on Communications (COMM), 1-4, 2014 | 3 | 2014 |
Using algebraic petri nets for testing the models of ad hoc secure routing protocols in mobility scenarios ML Pura, D Buchs 2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014 | 3 | 2014 |
Implementing cloud qualified electronic signatures for documents using available cryptographic libraries: a survey EC Ruica, ML Pura, I Aciobanitei 2020 13th International Conference on Communications (COMM), 113-118, 2020 | 2 | 2020 |
A BitTorrent DHT Crawler RG Simion, ML Pura 2019 IEEE 13th International Symposium on Applied Computational Intelligence …, 2019 | 2 | 2019 |
On the Modelling of Urban Infrastructure Deformation Profiles Using the Applied Element Method and Multiple Hypothesis Testing B Sebacher, SA Toma, M Lupoae, ML Pura IGARSS 2018-2018 IEEE International Geoscience and Remote Sensing Symposium …, 2018 | 2 | 2018 |
IDENTITY-BASED CHRYPTOGRAPHY: FROM PROPOSALS TO EVERYDAY USE. ML PURA, VV PATRICIU Scientific Research & Education in the Air Force-AFASES 1, 2014 | 2 | 2014 |
User Authentication to a Web Site Using Fingerprints ML PURA INTERNATIONAL SCIENTIFIC COMMITTEE, 347, 2014 | 2 | 2014 |