Diana Berbecaru
Orcid: 0000-0003-1930-9473
According to our database1,
Diana Berbecaru
authored at least 48 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
MATCH-IN: Mutual Attestation for Trusted Collaboration in Heterogeneous IoT Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Proceedings of the IEEE Symposium on Computers and Communications, 2024
On the evaluation of X.509 certificate processing in Transport Layer Security interceptors.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Threat-TLS: A Tool for Threat Identification in Weak, Malicious, or Suspicious TLS Connections.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Dataset for An evaluation of X.509 certificate revocation and related privacy issues in the Web PKI ecosystem.
Dataset, June, 2023
Mitigating Software Integrity Attacks With Trusted Computing in a Time Distribution Network.
IEEE Access, 2023
An Evaluation of X.509 Certificate Revocation and Related Privacy Issues in the Web PKI Ecosystem.
IEEE Access, 2023
Exploiting Emercoin Blockchain and Trusted Computing for IoT Scenarios: A Practical Approach.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the Intelligent Distributed Computing XVI, 2023
A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
2022
Counteracting software integrity attacks on IoT devices with remote attestation: a prototype.
Proceedings of the 26th International Conference on System Theory, Control and Computing , 2022
2021
On Enabling Additional Natural Person and Domain-Specific Attributes in the eIDAS Network.
IEEE Access, 2021
Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions.
Proceedings of the Intelligent Distributed Computing XIV, 2021
Verification of X.509 Attribute Certificates for Attribute-based Authorization: A Practical Approach.
Proceedings of the 25th International Conference on System Theory, Control and Computing, 2021
2020
Supporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructure.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach.
IEEE Access, 2020
ATEMA: An attribute enablement module for attribute retrieval and transfer through the eIDAS Network.
Proceedings of the 24th International Conference on System Theory, Control and Computing, 2020
2019
Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps.
Softw. Pract. Exp., 2019
Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure.
Inf., 2019
Towards Simplifying PKI Implementation: Client-Server based Validation of Public Key Certificates.
CoRR, 2019
Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure.
Proceedings of the Intelligent Distributed Computing XIII, 2019
2017
Proceedings of the 25th Euromicro International Conference on Parallel, 2017
2016
Proceedings of the 24th Euromicro International Conference on Parallel, 2016
On the design, implementation and integration of an Attribute Provider in the Pan-European eID infrastructure.
Proceedings of the IEEE Symposium on Computers and Communication, 2016
2015
Exploiting the European Union trusted service status list for certificate validation in STORK: design, implementation, and lessons learnt.
Softw. Pract. Exp., 2015
2013
FcgiOCSP: a scalable OCSP-based certificate validation system exploiting the FastCGI interface.
Softw. Pract. Exp., 2013
2011
Proceedings of the Trust, Privacy and Security in Digital Business, 2011
LRAP: A Location-Based Remote Client Authentication Protocol for Mobile Environments.
Proceedings of the 19th International Euromicro Conference on Parallel, 2011
2010
2009
Softw. Pract. Exp., 2009
2008
On the Performance and Use of a Space-Efficient Merkle Tree Traversal Algorithm in Real-Time Applications for Wireless and Sensor Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes.
Proceedings of the 16th Euromicro International Conference on Parallel, 2008
2007
Proceedings of the Public Key Infrastructure, 2007
2006
On the Tradeoff between Performance and Security in OCSP-Based Certificate Revocation Systems for Wireless Environments.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
2005
Proceedings of the 2nd IEEE International Symposium on Wireless Communication Systems, 2005
2004
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004
2002
Security aspects in standard certificate revocation mechanisms: a case study for OCSP.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
Secure Digital Administration in Medical Environment.
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002
2001
Proceedings of the Information Security, 4th International Conference, 2001
2000
A Flexible Management Framework for Certificate Status Validation.
Proceedings of the Information Security for Global Information Infrastructures, 2000