Zobrazeno 1 - 10
of 48
pro vyhledávání: '"Mihai-Lica Pura"'
Publikováno v:
2020 13th International Conference on Communications (COMM).
Qualified e lectronic s ignatures ( QES) a re legally equated with handwritten signatures and are the main mechanism to ensure the authenticity and integrity of electronic data. In E.U., adoption of QES services became easier from the user’s perspe
Publikováno v:
2020 13th International Conference on Communications (COMM).
According to European law (that also has equivalent national regulations across the globe), qualified electronic signatures have the same legal value as handwritten ones, so paper documents are replaced by electronic versions. As a consequence, elect
Publikováno v:
2020 13th International Conference on Communications (COMM).
Public Key Infrastructure (PKI) is an essential technology that enables secure communications over the Internet. Trust Service Providers (TSPs) have a crucial role in assuring the binding of the owner’s identity to the public key through the digita
Autor:
Mihai-Lica Pura, Elena-Casiana Fusu
Publikováno v:
2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).
Over the past decades, the scientists in the field of technology dreamt of a utopia in which computers are human-like machines, capable of comprehending emotions and feelings. Poetry, the sign of culture and intelligence, could be the final test to d
Publikováno v:
Innovative Security Solutions for Information Technology and Communications ISBN: 9783030410247
SECITC
SECITC
Advanced electronic signatures are the main security mechanism used for assuring authentication, integrity and non-repudiation of electronic documents. Digitization on a large scale requires secure and flexible electronic signature systems. In E.U.,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1a20b0249d0f7e2d24ca9e731b9eebd0
https://doi.org/10.1007/978-3-030-41025-4_15
https://doi.org/10.1007/978-3-030-41025-4_15
Publikováno v:
IGARSS
In this paper we analyze the possibility of detecting anomalous deformation profiles using supervised and unsupervised machine learning. For this we construct a simulated data set with deformation profiles, using canonical functions that model differ
Publikováno v:
2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).
Network Intrusion Detection Systems (NIDS) are a critical component in any security system and their role is to monitor traffic on a network, looking for suspicious activity (e.g. attacks, unauthorized activities). Neural networks have become an incr
Autor:
Mihai-Lica Pura, Robert-George Simion
Publikováno v:
SACI
BitTorrent is one of the largest source of data exchange over the Internet. The copyright and legal pressure from authorities systematically close torrent hosting sites, futilely trying to stop the damage done to the creative industry. As a consequen
Autor:
Stefan Bodoarca, Mihai-Lica Pura
Publikováno v:
Innovative Security Solutions for Information Technology and Communications ISBN: 9783030129415
SecITC
SecITC
On-line security is a very important aspect of Internet browsing, so a lot of research has been targeting confidentiality, integrity, authentication, non-repudiation and availability of on-line services. But another aspect that is at least equally im
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::02fc109cb8dfc75d348dff2f4910a279
https://doi.org/10.1007/978-3-030-12942-2_15
https://doi.org/10.1007/978-3-030-12942-2_15
MAC Protocol for Data Gathering in Wireless Sensor Networks with the Aid of Unmanned Aerial Vehicles
Publikováno v:
Advances in Electrical and Computer Engineering, Vol 16, Iss 2, Pp 51-56 (2016)
Data gathering in wireless sensor networks by employing unmanned aerial vehicles has been a subject of real interest in the recent years. While drones are seen as an efficient method of data gathering in almost any environment, wireless sensor networ