, Military Technical Academy, Romania
-
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT - Articles
Design and Implementation of a Cyber-Defense Exercise
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 2 No. 2 (2010): Security Technologies for ICT - Articles
A Comparative Analysis of the Secure Virtual Private Network Tunneling Protocols
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT - Articles
Cryptographic Applications using FPGA Technology
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT - Articles
PKI Interoperability Based on Online Certificate Validation
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT - Articles
Web Single Sign-On Implementation Using the SimpleSAMLphp Application
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 3 No. 1 (2011): Security Technologies for ICT - Articles
Interoperability Issues for VPN IPsec Solutions
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities - Articles
About group digital signatures
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities - Articles
Secure Single Sign-On using CAS and OpenID
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 4 No. 3 (2012): Security of Digital Identities - Articles
Live Forensics – Extracting Credentials on Windows and Linux Systems
Abstract PDF -
Journal of Mobile, Embedded and Distributed Systems Vol. 6 No. 3 (2014): Mobile and Cloud Technologies - Articles
Autoimmune Cyber Retaliation Supported by Visual Analytics
Abstract PDF