|
Issue |
Title |
|
Vol 2, No 1 (2010): Cryptographic Algorithms and Protocols |
Some Results on Algebraic Cryptanalysis of A5/2 Algorithm |
Abstract
PDF
|
Adela Mihaita |
|
Vol 4, No 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems |
Study on Audit for Distributed Applications: a Proposal for Simplified Audit Module Architecture |
Abstract
PDF
|
Anca Apostu |
|
Vol 1, No 1 (2009): Mobile and Wireless Applications |
Survey of Mobile Digital Rights Management Platforms |
Abstract
PDF
|
Cristian Toma, Catalin Boja |
|
Vol 4, No 1 (2012): Insights on Current and Future ICT Solutions |
System for Multicast File Transfer |
Abstract
PDF
|
Dorin Custura |
|
Vol 4, No 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems |
Techniques for Securing Web Content |
Abstract
PDF
|
Cristian Ursu |
|
Vol 6, No 1 (2014): Mobile, Web and Security |
Techniques for Finding Vulnerabilities in Web Applications |
Abstract
PDF
|
Mihai Sandulescu |
|
Vol 3, No 4 (2011): Insights on Mobile and Distributed Solutions |
Techniques of Program Code Obfuscation for Secure Software |
Abstract
PDF
|
Marius Popa |
|
Vol 2, No 2 (2010): Security Technologies for ICT |
The Cost Influence on Reliability and Security of the Software Systems |
Abstract
PDF
|
Marian Pompiliu Cristescu, Corina Ioana Cristescu, Laura Cacovean, Florin Martin |
|
Vol 5, No 2 (2013): Mobile technologies in Education and Economics |
The Internet as a Technology and Catalyst for Growth |
Abstract
PDF
|
Andreea Davidescu (Vasile) |
|
Vol 4, No 1 (2012): Insights on Current and Future ICT Solutions |
The Management of Law Firms Using Business Process Management, Document Management and Web Services Integration |
Abstract
PDF
|
Roxana Maria Petculet |
|
Vol 4, No 3 (2012): Security of Digital Identities |
The Use of Automated Software Tools in Evaluating an e-Learning Platform Quality |
Abstract
PDF
|
Traian Lucian Militaru, George Suciu, Gyorgy Todoran |
|
Vol 4, No 2 (2012): Evolution of ICT Technologies for Distributed and Mobile Systems |
Virtual Enterprises Reach for Cloud Computing |
Abstract
Untitled ()
PDF
|
Andreea Davidescu (Vasile) |
|
Vol 3, No 1 (2011): Security Technologies for ICT |
Vulnerability Analysis in Web Distributed Applications |
Abstract
PDF
|
Ion Ivan, Dragos Palaghita, Sorin Vinturis, Mihai Doinea |
|
Vol 2, No 2 (2010): Security Technologies for ICT |
Web Security in University Curricula |
Abstract
PDF
|
Cristian Opincaru |
|
Vol 3, No 1 (2011): Security Technologies for ICT |
Web Single Sign-On Implementation Using the SimpleSAMLphp Application |
Abstract
PDF
|
Ionut Andronache, Claudiu Nisipasiu |
|
Vol 3, No 4 (2011): Insights on Mobile and Distributed Solutions |
Web-Enabled Remote Laboratories |
Abstract
PDF
|
K. Ganesan, B. S. Saranraj |
|
Vol 2, No 1 (2010): Cryptographic Algorithms and Protocols |
WiMAX Security Issues in E-learning Systems |
Abstract
PDF
|
Felician Alecu, Paul Pocatilu, Sergiu Capisizu |
|
Vol 5, No 4 (2013): Security for Mobile technologies |
WPA/WPA2 Password Security Testing using Graphics Processing Units |
Abstract
PDF
|
Sorin Andrei Visan |
|
Vol 5, No 3 (2013): Performance and Security |
WSD Implementation for Processing Improvement of Structured Documents |
Abstract
PDF
|
Madalina Zurini |
|
126 - 144 of 144 Items |
<< < 1 2 3 4 5 6 |