Diana Berbecaru

According to our database1, Diana Berbecaru authored at least 29 papers between 2000 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Supporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructure.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach.
IEEE Access, 2020

ATEMA: An attribute enablement module for attribute retrieval and transfer through the eIDAS Network.
Proceedings of the 24th International Conference on System Theory, Control and Computing, 2020

Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps.
Softw. Pract. Exp., 2019

Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure.
Inf., 2019

A Practical Approach to expressing digitally signed documents.
CoRR, 2019

Support for public-key infrastructures in DNS.
CoRR, 2019

A Framework for Secure Digital Administration.
CoRR, 2019

Towards Simplifying PKI Implementation: Client-Server based Validation of Public Key Certificates.
CoRR, 2019

Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Towards Stronger Data Security in an eID Management Infrastructure.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Cryptographically verifiable anonymous voting using pan-european e-IDs.
CoRR, 2016

Efficient Attribute Management in a Federated Identity Management Infrastructure.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

On the design, implementation and integration of an Attribute Provider in the Pan-European eID infrastructure.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Exploiting the European Union trusted service status list for certificate validation in STORK: design, implementation, and lessons learnt.
Softw. Pract. Exp., 2015

FcgiOCSP: a scalable OCSP-based certificate validation system exploiting the FastCGI interface.
Softw. Pract. Exp., 2013

Exploiting Proxy-Based Federated Identity Management in Wireless Roaming Access.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

LRAP: A Location-Based Remote Client Authentication Protocol for Mobile Environments.
Proceedings of the 19th International Euromicro Conference on Parallel, 2011

The ForwardDiffSig Scheme for Multicast Authentication.
IEEE/ACM Trans. Netw., 2010

A unified and flexible solution for integrating CRL and OCSP into PKI applications.
Softw. Pract. Exp., 2009

On the Performance and Use of a Space-Efficient Merkle Tree Traversal Algorithm in Real-Time Applications for Wireless and Sensor Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes.
Proceedings of the 16th Euromicro International Conference on Parallel, 2008

On the Robustness of Applications Based on the SSL and TLS Security Protocols.
Proceedings of the Public Key Infrastructure, 2007

On the Tradeoff between Performance and Security in OCSP-Based Certificate Revocation Systems for Wireless Environments.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004

Security aspects in standard certificate revocation mechanisms: a case study for OCSP.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Secure Digital Administration in Medical Environment.
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002

On the Complexity of Public-Key Certificate Validation.
Proceedings of the Information Security, 4th International Conference, 2001

A Flexible Management Framework for Certificate Status Validation.
Proceedings of the Information Security for Global Information Infrastructures, 2000