Stefan-Ciprian Arseni

Orcid: 0000-0002-9986-3564

According to our database1, Stefan-Ciprian Arseni authored at least 15 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
LTPS - Service for long-term preservation of digital signatures.
Proceedings of the 14th International Conference on Electronics, 2022

2020
Secure Speaker Recognition System Using Homomorphic Encryption.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

2019
Multi-Layer IoT Security Framework for Ambient Intelligence Environments.
Sensors, 2019

Reputation-Based Security Framework for Internet of Things.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

Security-Oriented Framework for Internet of Things Smart-Home Applications.
Proceedings of the 22nd International Conference on Control Systems and Computer Science, 2019

2018
Evaluation of a Hybrid Architecture for Security in Internet-of-Things.
Proceedings of the 21st International Symposium on Wireless Personal Multimedia Communications, 2018

2017
Building a Unified Middleware Architecture for Security in IoT.
Proceedings of the Recent Advances in Information Systems and Technologies, 2017

A Hybrid Testbed for Secure Internet-of-Things.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2017

2016
Intrusion Prevention System Evaluation for SDN-Enabled IoT Systems.
Proceedings of the Pervasive Computing Paradigms for Mental Health, 2016

Pass-IoT: A platform for studying security, privacy and trust in IoT.
Proceedings of the International Conference on Communications, 2016

2015
Integrating telemetry sensors with cloud computing.
Proceedings of the 2015 14th RoEduNet International Conference, 2015

Monitoring a cloud-based speech processing system.
Proceedings of the 2015 7th International Conference on Electronics, 2015

Basic Internet Foundation and Cloud Computing.
Proceedings of the 10th International Conference on P2P, 2015

2014
Combined use of pattern recognition algorithms for keystroke-based continuous authentication system.
Proceedings of the 10th International Conference on Communications, 2014

Securing an alerting subsystem for a keystroke-based user identification system.
Proceedings of the 10th International Conference on Communications, 2014


  Loading...