Techniques of Program Code Obfuscation for Secure Software
Author(s): Marius Popa
Volume: 3
Issue: 4
Year: 2011




A Real-Time Face Recognition System Using Eigenfaces
Author(s): Daniel Georgescu
Volume: 3
Issue: 4
Year: 2011




Project Management with IT Security Focus
Author(s): Felician Alecu | Paul Pocatilu | Sergiu Capisizu
Volume: 3
Issue: 4
Year: 2011




Refined Method for Choosing a Security Solution for Mobile Application – Web Service Interactions
Author(s): Silvia Trif | Adrian Visoiu
Volume: 3
Issue: 4
Year: 2011




Security Aspects of Collaborative Banking Systems Applied in Economy
Author(s): Ion Ivan | Cristian Ciurea
Volume: 3
Issue: 4
Year: 2011




Web-Enabled Remote Laboratories
Author(s): K. Ganesan | B. S. Saranraj
Volume: 3
Issue: 4
Year: 2011




BWS Open System Architecture Security Assessment
Author(s): Cristian Ionita
Volume: 3
Issue: 4
Year: 2011




MPEG Video Security using Motion Vectors and Quadtrees
Author(s): Anshul Singhal | Manik Lal Das
Volume: 4
Issue: 3
Year: 2012




Securing SIP: An Easy and Effective Solution
Author(s): Cristian Cojanu
Volume: 4
Issue: 3
Year: 2012




Live Forensics – Extracting Credentials on Windows and Linux Systems
Author(s): Liviu Itoafa
Volume: 4
Issue: 3
Year: 2012




A Study of Implementing an Information Security Management System for Open Source Cloud Computing
Author(s): George Suciu | Vlad Poenaru | Cristian Cernat | Traian Lucian Militaru | Gyorgy Todoran
Volume: 4
Issue: 3
Year: 2012




OpenID, a Single Sign-On Solution for E-learning Applications
Author(s): Felician Alecu | Paul Pocatilu | George Stoica | Cristian Ciurea | Sergiu Capisizu
Volume: 3
Issue: 3
Year: 2011




Hiding Malicious Content in PDF Documents
Author(s): Dan Sabin Popescu
Volume: 3
Issue: 3
Year: 2011




Security Survey of Internet Browsers Data Managers
Author(s): Catalin Boja
Volume: 3
Issue: 3
Year: 2011




Methods and Techniques of Quality Management for ICT Audit Processes
Author(s): Marius Popa
Volume: 3
Issue: 3
Year: 2011




Secure Single Sign-On using CAS and OpenID

Author(s): Mihai-Gabriel IONIȚĂ
Volume: 4
Issue: 3
Year: 2012





The Use of Automated Software Tools in Evaluating an e-Learning Platform Quality

Author(s): Traian-Lucian MILITARU | George SUCIU | Gyorgy TODORAN
Volume: 4
Issue: 3
Year: 2012





About the Key Escrow Properties of Identity Based Encryption Schemes

Author(s): Ruxandra OLIMID
Volume: 4
Issue: 3
Year: 2012





Implementing graphic passwords in Directory Services Systems
Author(s): Emanuil Rednic | Andrei Toma
Volume: 2
Issue: 2
Year: 2010




Integrating e-Payment Services with RIA Applications
Author(s): Mihai Pricope | Radu Constantinescu
Volume: 2
Issue: 2
Year: 2010




An Adaptive Authorization Model Based on RBAC
Author(s): Radu Constantinescu | Lucian Corlan
Volume: 1
Issue: 2
Year: 2009




DECWEB - Internet Fiscal Statement Submission
Author(s): Mihai Ianciu | Costin Burdun | Ionut Florea
Volume: 1
Issue: 2
Year: 2009




On-line Payment System Survey – eCash
Author(s): Marius Popa | Adrian Calugaru
Volume: 1
Issue: 2
Year: 2009




Sample Development on Java Smart-Card Electronic Wallet Application
Author(s): Toma Cristian
Volume: 1
Issue: 2
Year: 2009




Virtual Enterprises Reach for Cloud Computing
Author(s): Andreea Davidescu (Vasile)
Volume: 4
Issue: 2
Year: 2012




An Advanced Platform for Collaborative and Mobile Enterprise 2.0
Author(s): Domenico Consoli
Volume: 4
Issue: 2
Year: 2012




Study on Audit for Distributed Applications: a Proposal for Simplified Audit Module Architecture
Author(s): Anca Apostu
Volume: 4
Issue: 2
Year: 2012




Agent-Based Framework for Implementing and Deploying of SOA
Author(s): Alexandru Butoi | Gabriela Andreea Morar | Andreea Ilea
Volume: 4
Issue: 2
Year: 2012




Self-Healing for Mobile Applications
Author(s): Ion Ivan | Catalin Boja | Alin Zamfiroiu
Volume: 4
Issue: 2
Year: 2012




An Alternative Solution to Https for Secure Access to Web Services
Author(s): Cristina Livia Iancu
Volume: 4
Issue: 2
Year: 2012




AES Encryption and Decryption Using Direct3D 10 API
Author(s): Adrian Marius Chiuta
Volume: 3
Issue: 2
Year: 2011




Security Issues in Streaming Server for Mobile Devices Development
Author(s): Dan Barbu
Volume: 3
Issue: 2
Year: 2011




Smart Cards Applications in the Healthcare System
Author(s): Claudiu Oltean
Volume: 3
Issue: 2
Year: 2011




Legal and Practical Aspects in the Computer Science Investigation
Author(s): Florin Cosmin Trandafir
Volume: 3
Issue: 2
Year: 2011




A Comparative Analysis of the Secure Virtual Private Network Tunneling Protocols
Author(s): Gabriel Popescu
Volume: 2
Issue: 2
Year: 2010




Design and Implementation of a Cyber-Defense Exercise
Author(s): Adrian Furtuna
Volume: 2
Issue: 2
Year: 2010




The Cost Influence on Reliability and Security of the Software Systems
Author(s): Marian Pompiliu Cristescu | Corina Ioana Cristescu | Laura Cacovean | Florin Martin
Volume: 2
Issue: 2
Year: 2010




Requirements for Development of an Assessment System for IT&C Security Audit
Author(s): Marius Popa
Volume: 2
Issue: 2
Year: 2010




Security in SPGBP – Simulation of Protein Generation Bioinformatic Project
Author(s): Toma Cristian | Elena Purcaru
Volume: 2
Issue: 1
Year: 2010




Security Engineering and Reengineering on Windows 2008 Server Based Distributed Systems
Author(s): Cosmin Tomozei
Volume: 2
Issue: 1
Year: 2010




WiMAX Security Issues in E-learning Systems
Author(s): Felician Alecu | Paul Pocatilu | Sergiu Capisizu
Volume: 2
Issue: 1
Year: 2010




Image Processing Oriented to Security Optimization
Author(s): Ion Ivan | Adrian Visoiu | Mihai Doinea
Volume: 2
Issue: 1
Year: 2010




Some Results on Algebraic Cryptanalysis of A5/2 Algorithm
Author(s): Adela Mihaita
Volume: 2
Issue: 1
Year: 2010




Java and Symbian M-Application Distribution Frameworks
Author(s): Marius Popa | Mihai Doinea | Cristian Toma
Volume: 1
Issue: 1
Year: 2009




Survey of Mobile Digital Rights Management Platforms
Author(s): Cristian Toma | Catalin Boja
Volume: 1
Issue: 1
Year: 2009




Future Developments in Non-Repudiation in GSM WAP Applications
Author(s): Cristian Toma
Volume: 1
Issue: 1
Year: 2009




Mobile Agents Systems in Wireless Applications
Author(s): Mihaela Muntean | Cristian Toma
Volume: 1
Issue: 1
Year: 2009




A Short Resume of Romanian Electronic Passports System - ePASS
Author(s): Claudiu Horatiu Judea
Volume: 4
Issue: 1
Year: 2012




The Management of Law Firms Using Business Process Management, Document Management and Web Services Integration
Author(s): Roxana Maria Petculet
Volume: 4
Issue: 1
Year: 2012




Internet Banking Two-Factor Authentication using Smartphones
Author(s): Costin Andrei Soare
Volume: 4
Issue: 1
Year: 2012




On the Security of Black-Box Implementation of Visual Secret Sharing Schemes
Author(s): Adrian Atanasiu | Ruxandra Olimid | Emil Simion
Volume: 4
Issue: 1
Year: 2012




Security Issues for 2D Barcodes Ticketing Systems
Author(s): Cristian Toma
Volume: 3
Issue: 1
Year: 2011




Interoperability Issues for VPN IPsec Solutions
Author(s): Iulian Danalachi | Mihai Lucian Petrescu
Volume: 3
Issue: 1
Year: 2011




Web Single Sign-On Implementation Using the SimpleSAMLphp Application
Author(s): Ionut Andronache | Claudiu Nisipasiu
Volume: 3
Issue: 1
Year: 2011




PKI Interoperability Based on Online Certificate Validation
Author(s): Dinu Smadu
Volume: 3
Issue: 1
Year: 2011




Cryptographic Applications using FPGA Technology
Author(s): Alexandru Coman | Radu Fratila
Volume: 3
Issue: 1
Year: 2011




Vulnerability Analysis in Web Distributed Applications
Author(s): Ion Ivan | Dragos Palaghita | Sorin Vinturis | Mihai Doinea
Volume: 3
Issue: 1
Year: 2011



