Madalina Baltatu

According to our database1, Madalina Baltatu authored at least 14 papers between 2000 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Android Apps Risk Evaluation: a methodology.
EAI Endorsed Trans. Ubiquitous Environ., 2015

2014
How dangerous is your Android app?: an evaluation methodology.
Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, 2014

2013
Security for smart mobile networks: The NEMESYS approach.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem.
Proceedings of the Information Sciences and Systems 2013, 2013

NEMESYS: First Year Project Experience in Telecom Italia Information Technology.
Proceedings of the Information Sciences and Systems 2013, 2013

2008
Entropy Analysis and New Constructions of Biometric Key Generation Systems.
IEEE Trans. Inf. Theory, 2008

2007
Soft Generation of Secure Biometric Keys.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
A Face Recognition System for Mobile Phones.
Proceedings of the ISSE 2006, 2006

Implementing Biometrics-Based Authentication for Mobile Devices.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

User Authentication based on Face Recognition with Support Vector Machines.
Proceedings of the Third Canadian Conference on Computer and Robot Vision (CRV 2006), 2006

2004
Toward Ubiquitous Acceptance of Biometric Authentication: Template Protection Techniques.
Proceedings of the Biometric Authentication, 2004

2001
Towards a policy system for IPsec: issues and an experimental implementation.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

2000
Security issues in control, management and routing protocols.
Comput. Networks, 2000

Security policy system: status and perspective.
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000


  Loading...