Mihai-Lica Pura

According to our database1, Mihai-Lica Pura authored at least 28 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Implementing Cloud Qualified Electronic Signatures for Documents using Available Cryptographic Libraries: A Survey.
Proceedings of the 13th International Conference on Communications, 2020

Qualified Electronic Signature SaaS Solution for Google Docs & Google Sheets Documents.
Proceedings of the 13th International Conference on Communications, 2020

SABRES - A Proof of Concept for Enhanced Cloud Qualified Electronic Signatures.
Proceedings of the 13th International Conference on Communications, 2020

ROetry: First Steps Towards Computer Generated Poetry in Romanian Language.
Proceedings of the 12th International Conference on Electronics, 2020

2019
Spoken Language Detection Experiments for Romanian.
Proceedings of the 2019 International Conference on Speech Technology and Human-Computer Dialogue, 2019

Learned Lessons from Implementing an Android Client for the Cloud Signature Consortium API.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

A BitTorrent DHT Crawler.
Proceedings of the 13th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2019

On Anomalous Deformation Profile Detection Through Supervised and Unsupervised Machine Learning.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

Web GUI for Automating the Formal Verification of Security Protocols using Casper & FDR4.
Proceedings of the 11th International Conference on Electronics, 2019

Tiny Network Intrusion Detection System with High Performance.
Proceedings of the 11th International Conference on Electronics, 2019

2018
Assuring Privacy in Surfing the Internet.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Using Cryptography in the Cloud for Lightweight Authentication Protocols Based on QR Codes.
Proceedings of the 12th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2018

Lightweight Version of SQRL Authentication Protocol Based on Cryptography in the Cloud.
Proceedings of the 12th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2018

On the Modelling of Urban Infrastructure Deformation Profiles Using the Applied Element Method and Multiple Hypothesis Testing.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

AVISPA versus AVANTSSAR in the Model Checking of Secure Communication Protocols.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

A Cryptography API: Next Generation Key Storage Provider for Cryptography in the Cloud.
Proceedings of the 2018 10th International Conference on Electronics, 2018

2017
MaRePhoR - An open access machine-readable phonetic dictionary for Romanian.
Proceedings of the International Conference on Speech Technology and Human-Computer Dialogue, 2017

CTL formula evaluation by term rewriting inversion.
Proceedings of the 9th International Conference on Electronics, 2017

2016
Generation of the path to counter-examples by backward state space traversal in symbolic model checking based on term rewriting.
Proceedings of the International Conference on Communications, 2016

Using gamma formalism for model-based testing for the routing protocols for mobile ad hoc networks.
Proceedings of the International Conference on Communications, 2016

2015
Symbolic Model Checking of Security Protocols for Ad hoc Networks on any Topologies.
Trans. Petri Nets Other Model. Concurr., 2015

Hybrid Distributed-Hierarchical Identity Based Cryptographic Scheme for Wireless Sensor Networks.
Proceedings of the New Contributions in Information Systems and Technologies, 2015

2014
Using Algebraic Petri Nets for Testing the Models of Ad Hoc Secure Routing Protocols in Mobility Scenarios.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

A self-organized key management scheme for ad hoc networks based on identity-based cryptography.
Proceedings of the 10th International Conference on Communications, 2014

Model checking ARAN ad hoc secure routing protocol with algebraic Petri nets.
Proceedings of the 10th International Conference on Communications, 2014

Using Symbolic Techniques and Algebraic Petri Nets to Model Check Security Protocols for Ad Hoc Networks.
Proceedings of the International Workshop on Petri Nets and Software Engineering, 2014

2010
Formal Verification of G-PAKE Using Casper/FDR2 - Securing a Group PAKE Protocol Using Casper/FDR2.
Proceedings of the SECRYPT 2010, 2010

2009
Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks.
Proceedings of the SECRYPT 2009, 2009


  Loading...