Diana Berbecaru

Orcid: 0000-0003-1930-9473

According to our database1, Diana Berbecaru authored at least 40 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Mitigating Software Integrity Attacks With Trusted Computing in a Time Distribution Network.
IEEE Access, 2023

An Evaluation of X.509 Certificate Revocation and Related Privacy Issues in the Web PKI Ecosystem.
IEEE Access, 2023

Exploiting Emercoin Blockchain and Trusted Computing for IoT Scenarios: A Practical Approach.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Autoencoder-SAD: An Autoencoder-based Model for Security Attacks Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

TLS-Monitor: A Monitor for TLS Attacks.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
Counteracting software integrity attacks on IoT devices with remote attestation: a prototype.
Proceedings of the 26th International Conference on System Theory, Control and Computing , 2022

2021
On Enabling Additional Natural Person and Domain-Specific Attributes in the eIDAS Network.
IEEE Access, 2021

Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions.
Proceedings of the Intelligent Distributed Computing XIV, 2021

Verification of X.509 Attribute Certificates for Attribute-based Authorization: A Practical Approach.
Proceedings of the 25th International Conference on System Theory, Control and Computing, 2021

2020
Supporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructure.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach.
IEEE Access, 2020

ATEMA: An attribute enablement module for attribute retrieval and transfer through the eIDAS Network.
Proceedings of the 24th International Conference on System Theory, Control and Computing, 2020

2019
Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps.
Softw. Pract. Exp., 2019

Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure.
Inf., 2019

A Practical Approach to expressing digitally signed documents.
CoRR, 2019

Support for public-key infrastructures in DNS.
CoRR, 2019

A Framework for Secure Digital Administration.
CoRR, 2019

Towards Simplifying PKI Implementation: Client-Server based Validation of Public Key Certificates.
CoRR, 2019

Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure.
Proceedings of the Intelligent Distributed Computing XIII, 2019

2017
Towards Stronger Data Security in an eID Management Infrastructure.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

2016
Cryptographically verifiable anonymous voting using pan-european e-IDs.
CoRR, 2016

Efficient Attribute Management in a Federated Identity Management Infrastructure.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

On the design, implementation and integration of an Attribute Provider in the Pan-European eID infrastructure.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
Exploiting the European Union trusted service status list for certificate validation in STORK: design, implementation, and lessons learnt.
Softw. Pract. Exp., 2015

2013
FcgiOCSP: a scalable OCSP-based certificate validation system exploiting the FastCGI interface.
Softw. Pract. Exp., 2013

2011
Exploiting Proxy-Based Federated Identity Management in Wireless Roaming Access.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

LRAP: A Location-Based Remote Client Authentication Protocol for Mobile Environments.
Proceedings of the 19th International Euromicro Conference on Parallel, 2011

2010
The ForwardDiffSig Scheme for Multicast Authentication.
IEEE/ACM Trans. Netw., 2010

2009
A unified and flexible solution for integrating CRL and OCSP into PKI applications.
Softw. Pract. Exp., 2009

2008
On the Performance and Use of a Space-Efficient Merkle Tree Traversal Algorithm in Real-Time Applications for Wireless and Sensor Networks.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes.
Proceedings of the 16th Euromicro International Conference on Parallel, 2008

2007
On the Robustness of Applications Based on the SSL and TLS Security Protocols.
Proceedings of the Public Key Infrastructure, 2007

2006
On the Tradeoff between Performance and Security in OCSP-Based Certificate Revocation Systems for Wireless Environments.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
On Measuring SSL-based Secure Data Transfer with Handheld Devices.
Proceedings of the 2nd IEEE International Symposium on Wireless Communication Systems, 2005

2004
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI.
Proceedings of the IADIS International Conference WWW/Internet 2004, 2004

2002
Security aspects in standard certificate revocation mechanisms: a case study for OCSP.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Secure Digital Administration in Medical Environment.
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002

2001
On the Complexity of Public-Key Certificate Validation.
Proceedings of the Information Security, 4th International Conference, 2001

2000
A Flexible Management Framework for Certificate Status Validation.
Proceedings of the Information Security for Global Information Infrastructures, 2000


  Loading...