Mihai-Lica Pura
According to our database1,
Mihai-Lica Pura
authored at least 28 papers
between 2009 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
0
1
2
3
4
5
6
7
1
4
6
6
2
2
1
4
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Implementing Cloud Qualified Electronic Signatures for Documents using Available Cryptographic Libraries: A Survey.
Proceedings of the 13th International Conference on Communications, 2020
Qualified Electronic Signature SaaS Solution for Google Docs & Google Sheets Documents.
Proceedings of the 13th International Conference on Communications, 2020
Proceedings of the 13th International Conference on Communications, 2020
Proceedings of the 12th International Conference on Electronics, 2020
2019
Proceedings of the 2019 International Conference on Speech Technology and Human-Computer Dialogue, 2019
Learned Lessons from Implementing an Android Client for the Cloud Signature Consortium API.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019
Proceedings of the 13th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2019
On Anomalous Deformation Profile Detection Through Supervised and Unsupervised Machine Learning.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019
Web GUI for Automating the Formal Verification of Security Protocols using Casper & FDR4.
Proceedings of the 11th International Conference on Electronics, 2019
Proceedings of the 11th International Conference on Electronics, 2019
2018
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018
Using Cryptography in the Cloud for Lightweight Authentication Protocols Based on QR Codes.
Proceedings of the 12th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2018
Lightweight Version of SQRL Authentication Protocol Based on Cryptography in the Cloud.
Proceedings of the 12th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2018
On the Modelling of Urban Infrastructure Deformation Profiles Using the Applied Element Method and Multiple Hypothesis Testing.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
A Cryptography API: Next Generation Key Storage Provider for Cryptography in the Cloud.
Proceedings of the 2018 10th International Conference on Electronics, 2018
2017
Proceedings of the International Conference on Speech Technology and Human-Computer Dialogue, 2017
Proceedings of the 9th International Conference on Electronics, 2017
2016
Generation of the path to counter-examples by backward state space traversal in symbolic model checking based on term rewriting.
Proceedings of the International Conference on Communications, 2016
Using gamma formalism for model-based testing for the routing protocols for mobile ad hoc networks.
Proceedings of the International Conference on Communications, 2016
2015
Trans. Petri Nets Other Model. Concurr., 2015
Hybrid Distributed-Hierarchical Identity Based Cryptographic Scheme for Wireless Sensor Networks.
Proceedings of the New Contributions in Information Systems and Technologies, 2015
2014
Using Algebraic Petri Nets for Testing the Models of Ad Hoc Secure Routing Protocols in Mobility Scenarios.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014
A self-organized key management scheme for ad hoc networks based on identity-based cryptography.
Proceedings of the 10th International Conference on Communications, 2014
Proceedings of the 10th International Conference on Communications, 2014
Using Symbolic Techniques and Algebraic Petri Nets to Model Check Security Protocols for Ad Hoc Networks.
Proceedings of the International Workshop on Petri Nets and Software Engineering, 2014
2010
Formal Verification of G-PAKE Using Casper/FDR2 - Securing a Group PAKE Protocol Using Casper/FDR2.
Proceedings of the SECRYPT 2010, 2010
2009
Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks.
Proceedings of the SECRYPT 2009, 2009