Sead Muftic
According to our database1,
Sead Muftic
authored at least 40 papers
between 1986 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger.
Ledger, 2016
J. Electr. Comput. Eng., 2016
2015
Trans. Emerg. Telecommun. Technol., 2015
2014
Proceedings of the 37th International Convention on Information and Communication Technology, 2014
2013
Proceedings of the 19th International Conference on Control Systems and Computer Science, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
2011
Proceedings of the 2011 World Congress on Internet Security, 2011
Proceedings of the 2011 World Congress on Internet Security, 2011
Proceedings of the 2011 World Congress on Internet Security, 2011
Providing an Additional Factor for Patient Identification Based on Digital Fingerprint.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications, 2011
2010
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the CRiSIS 2009, 2009
2008
Intrusion Detection and Prevention System using Secure Mobile Agents.
Proceedings of the SECRYPT 2008, 2008
Cryptonet: Secure E-Mail System.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
Proceedings of the Computer Safety, 2007
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007
Assessment of Energy Consumption in Wireless Sensor Networks: A Case Study for Security Algorithms.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007
2003
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003
2002
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002
1999
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999
1995
Comput. Networks ISDN Syst., 1995
1994
1992
Implementation of the Comprehensive Integrated Security System for Computer Networks.
Comput. Networks ISDN Syst., 1992
1990
1989
Security mechanisms for computer networks.
Ellis Horwood series in computers and their applications, Ellis Horwood, ISBN: 978-0-13-799180-8, 1989
1988
1986
Comput. Networks, 1986