Sead Muftic

According to our database1, Sead Muftic authored at least 40 papers between 1986 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger.
Ledger, 2016

Business Information Exchange System with Security, Privacy, and Anonymity.
J. Electr. Comput. Eng., 2016

2015
MagicNET: mobile agents data protection system.
Trans. Emerg. Telecommun. Technol., 2015

2014
Secure and privacy-enhanced e-mail system based on the concept of proxies.
Proceedings of the 37th International Convention on Information and Communication Technology, 2014

2013
An Architecture for Secure m-Commerce Applications.
Proceedings of the 19th International Conference on Control Systems and Computer Science, 2013

2012
Location-Based Authentication and Authorization Using Smart Phones.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
The concept of Secure Mobile Wallet.
Proceedings of the 2011 World Congress on Internet Security, 2011

Secure service-oriented architecture for mobile transactions.
Proceedings of the 2011 World Congress on Internet Security, 2011

Security extensions of Windows environment based on FIPS 201 (PIV) smart card.
Proceedings of the 2011 World Congress on Internet Security, 2011

Providing an Additional Factor for Patient Identification Based on Digital Fingerprint.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Secure Middleware for Mobile Phones and UICC Applications.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications, 2011

2010
SAMSON: Secure access for medical smart cards over networks.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

MagicNET: Security System for Protection of Mobile Agents.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Secure healthcare information exchange for local domains.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

MagicNET: Security System for Development, Validation and Adoption of Mobile Agents.
Proceedings of the Third International Conference on Network and System Security, 2009

MagicNET: XACML authorization policies for mobile agents.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

A model and design of a security provider for Java applications.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

CryptoNET: Secure federation protocol and authorization policies for SMI.
Proceedings of the CRiSIS 2009, 2009

2008
Intrusion Detection and Prevention System using Secure Mobile Agents.
Proceedings of the SECRYPT 2008, 2008

Cryptonet: Secure E-Mail System.
Proceedings of the SECRYPT 2008, 2008

Security in Operational Wireless Sensor Networks.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Management of Groups and Group Keys in Multi-level Security Environments.
Proceedings of the Computer Safety, 2007

Balancing Security and Energy Consumption in Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Assessment of Energy Consumption in Wireless Sensor Networks: A Case Study for Security Algorithms.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Key Establishment Protocol for Wireless Sensor Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Measurement of Energy Costs of Security in Wireless Sensor Nodes.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

2003
Certificate Management in Ad Hoc Networks.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

2002
Bi-directional Web Document Protection System for Serious E-commerce Applications.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

1999
A Secure Payment System for Electronic Commerce.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

1995
COST-PEM certificates verification: An alternative procedure.
Comput. Networks ISDN Syst., 1995

1994
Security architecture for distributed systems.
Comput. Commun., 1994

Editorial.
Comput. Commun., 1994

Security Architecture for ODP Systems.
Comput. Networks ISDN Syst., 1994

1992
CISS: Generalized security libraries.
Comput. Secur., 1992

Implementation of the Comprehensive Integrated Security System for Computer Networks.
Comput. Networks ISDN Syst., 1992

1990
Transaction protection by "antennas".
Comput. Secur., 1990

1989
Extended OSI Security Architecture.
Comput. Networks, 1989

Security mechanisms for computer networks.
Ellis Horwood series in computers and their applications, Ellis Horwood, ISBN: 978-0-13-799180-8, 1989

1988
Security Mechanisms for Computer Networks.
Comput. Networks, 1988

1986
Secury Mechanisms for Computer Networks (A Program of the CEC COST-11 Ter Project).
Comput. Networks, 1986


  Loading...