Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of Mobile, Embedded and Distributed Systems

ISSN: 2067--4074
Publisher: Bucharest University of Economic Studies


ADD TO MY LIST
 
Techniques of Program Code Obfuscation for Secure Software

Author(s): Marius Popa
Volume: 3
Issue: 4
Year: 2011
A Real-Time Face Recognition System Using Eigenfaces

Author(s): Daniel Georgescu
Volume: 3
Issue: 4
Year: 2011
Project Management with IT Security Focus

Author(s): Felician Alecu | Paul Pocatilu | Sergiu Capisizu
Volume: 3
Issue: 4
Year: 2011
Refined Method for Choosing a Security Solution for Mobile Application – Web Service Interactions

Author(s): Silvia Trif | Adrian Visoiu
Volume: 3
Issue: 4
Year: 2011
Security Aspects of Collaborative Banking Systems Applied in Economy

Author(s): Ion Ivan | Cristian Ciurea
Volume: 3
Issue: 4
Year: 2011
Web-Enabled Remote Laboratories

Author(s): K. Ganesan | B. S. Saranraj
Volume: 3
Issue: 4
Year: 2011
BWS Open System Architecture Security Assessment

Author(s): Cristian Ionita
Volume: 3
Issue: 4
Year: 2011
MPEG Video Security using Motion Vectors and Quadtrees

Author(s): Anshul Singhal | Manik Lal Das
Volume: 4
Issue: 3
Year: 2012
About group digital signatures

Author(s): Adriana Cristina Enache
Volume: 4
Issue: 3
Year: 2012
Securing SIP: An Easy and Effective Solution

Author(s): Cristian Cojanu
Volume: 4
Issue: 3
Year: 2012
Live Forensics – Extracting Credentials on Windows and Linux Systems

Author(s): Liviu Itoafa
Volume: 4
Issue: 3
Year: 2012
A Study of Implementing an Information Security Management System for Open Source Cloud Computing

Author(s): George Suciu | Vlad Poenaru | Cristian Cernat | Traian Lucian Militaru | Gyorgy Todoran
Volume: 4
Issue: 3
Year: 2012
2D Barcode for DNA Encoding

Author(s): Elena Purcaru | Cristian Toma
Volume: 3
Issue: 3
Year: 2011
OpenID, a Single Sign-On Solution for E-learning Applications

Author(s): Felician Alecu | Paul Pocatilu | George Stoica | Cristian Ciurea | Sergiu Capisizu
Volume: 3
Issue: 3
Year: 2011
Information Security Standards

Author(s): Dan Constantin Tofan
Volume: 3
Issue: 3
Year: 2011
Hiding Malicious Content in PDF Documents

Author(s): Dan Sabin Popescu
Volume: 3
Issue: 3
Year: 2011
Security Survey of Internet Browsers Data Managers

Author(s): Catalin Boja
Volume: 3
Issue: 3
Year: 2011
Methods and Techniques of Quality Management for ICT Audit Processes

Author(s): Marius Popa
Volume: 3
Issue: 3
Year: 2011
Secure Single Sign-On using CAS and OpenID PDF available

Author(s): Mihai-Gabriel IONIȚĂ
Volume: 4
Issue: 3
Year: 2012
The Use of Automated Software Tools in Evaluating an e-Learning Platform Quality PDF available

Author(s): Traian-Lucian MILITARU | George SUCIU | Gyorgy TODORAN
Volume: 4
Issue: 3
Year: 2012
About the Key Escrow Properties of Identity Based Encryption Schemes PDF available

Author(s): Ruxandra OLIMID
Volume: 4
Issue: 3
Year: 2012
Implementing graphic passwords in Directory Services Systems

Author(s): Emanuil Rednic | Andrei Toma
Volume: 2
Issue: 2
Year: 2010
Integrating e-Payment Services with RIA Applications

Author(s): Mihai Pricope | Radu Constantinescu
Volume: 2
Issue: 2
Year: 2010
An Adaptive Authorization Model Based on RBAC

Author(s): Radu Constantinescu | Lucian Corlan
Volume: 1
Issue: 2
Year: 2009
Pool-site E-voting Security

Author(s): Ciprian Ezeanu
Volume: 1
Issue: 2
Year: 2009
DECWEB - Internet Fiscal Statement Submission

Author(s): Mihai Ianciu | Costin Burdun | Ionut Florea
Volume: 1
Issue: 2
Year: 2009
On-line Payment System Survey – eCash

Author(s): Marius Popa | Adrian Calugaru
Volume: 1
Issue: 2
Year: 2009
Secure Mechanisms for E-Ticketing System

Author(s): Toma Cristian
Volume: 1
Issue: 2
Year: 2009
Sample Development on Java Smart-Card Electronic Wallet Application

Author(s): Toma Cristian
Volume: 1
Issue: 2
Year: 2009
Virtual Enterprises Reach for Cloud Computing

Author(s): Andreea Davidescu (Vasile)
Volume: 4
Issue: 2
Year: 2012
An Advanced Platform for Collaborative and Mobile Enterprise 2.0

Author(s): Domenico Consoli
Volume: 4
Issue: 2
Year: 2012
Agent-Based Framework for Implementing and Deploying of SOA

Author(s): Alexandru Butoi | Gabriela Andreea Morar | Andreea Ilea
Volume: 4
Issue: 2
Year: 2012
Self-Healing for Mobile Applications

Author(s): Ion Ivan | Catalin Boja | Alin Zamfiroiu
Volume: 4
Issue: 2
Year: 2012
An Alternative Solution to Https for Secure Access to Web Services

Author(s): Cristina Livia Iancu
Volume: 4
Issue: 2
Year: 2012
Techniques for Securing Web Content

Author(s): Cristian Ursu
Volume: 4
Issue: 2
Year: 2012
Rootkits and Malicious Code Injection

Author(s): Marius Vlad
Volume: 3
Issue: 2
Year: 2011
AES Encryption and Decryption Using Direct3D 10 API

Author(s): Adrian Marius Chiuta
Volume: 3
Issue: 2
Year: 2011
Security Issues in Streaming Server for Mobile Devices Development

Author(s): Dan Barbu
Volume: 3
Issue: 2
Year: 2011
Smart Cards Applications in the Healthcare System

Author(s): Claudiu Oltean
Volume: 3
Issue: 2
Year: 2011
Legal and Practical Aspects in the Computer Science Investigation

Author(s): Florin Cosmin Trandafir
Volume: 3
Issue: 2
Year: 2011
A Comparative Analysis of the Secure Virtual Private Network Tunneling Protocols

Author(s): Gabriel Popescu
Volume: 2
Issue: 2
Year: 2010
Web Security in University Curricula

Author(s): Cristian Opincaru
Volume: 2
Issue: 2
Year: 2010
Design and Implementation of a Cyber-Defense Exercise

Author(s): Adrian Furtuna
Volume: 2
Issue: 2
Year: 2010
The Cost Influence on Reliability and Security of the Software Systems

Author(s): Marian Pompiliu Cristescu | Corina Ioana Cristescu | Laura Cacovean | Florin Martin
Volume: 2
Issue: 2
Year: 2010
Key Recovery for Certification Authorities

Author(s): Eduard Tric
Volume: 2
Issue: 2
Year: 2010
Requirements for Development of an Assessment System for IT&C Security Audit

Author(s): Marius Popa
Volume: 2
Issue: 2
Year: 2010
Security in SPGBP – Simulation of Protein Generation Bioinformatic Project

Author(s): Toma Cristian | Elena Purcaru
Volume: 2
Issue: 1
Year: 2010
Chess Cryptosystem

Author(s): Alexandru Miron Gatej
Volume: 2
Issue: 1
Year: 2010
WiMAX Security Issues in E-learning Systems

Author(s): Felician Alecu | Paul Pocatilu | Sergiu Capisizu
Volume: 2
Issue: 1
Year: 2010
Image Processing Oriented to Security Optimization

Author(s): Ion Ivan | Adrian Visoiu | Mihai Doinea
Volume: 2
Issue: 1
Year: 2010
Some Results on Algebraic Cryptanalysis of A5/2 Algorithm

Author(s): Adela Mihaita
Volume: 2
Issue: 1
Year: 2010
Java and Symbian M-Application Distribution Frameworks

Author(s): Marius Popa | Mihai Doinea | Cristian Toma
Volume: 1
Issue: 1
Year: 2009
Survey of Mobile Digital Rights Management Platforms

Author(s): Cristian Toma | Catalin Boja
Volume: 1
Issue: 1
Year: 2009
Future Developments in Non-Repudiation in GSM WAP Applications

Author(s): Cristian Toma
Volume: 1
Issue: 1
Year: 2009
Mobile Agents Systems in Wireless Applications

Author(s): Mihaela Muntean | Cristian Toma
Volume: 1
Issue: 1
Year: 2009
Issues in WiFi Networks

Author(s): Nicolae Tomai | Cristian Toma
Volume: 1
Issue: 1
Year: 2009
Security Issues for JME M-Applications

Author(s): Catalin Boja
Volume: 1
Issue: 1
Year: 2009
A Short Resume of Romanian Electronic Passports System - ePASS

Author(s): Claudiu Horatiu Judea
Volume: 4
Issue: 1
Year: 2012
Mobile Remote Control Architecture

Author(s): George Stefan Bogdan
Volume: 4
Issue: 1
Year: 2012
Facial Recognition using OpenCV

Author(s): Valentin Petrut Suciu
Volume: 4
Issue: 1
Year: 2012
System for Multicast File Transfer

Author(s): Dorin Custura
Volume: 4
Issue: 1
Year: 2012
Methods for Obfuscating Java Programs

Author(s): Florin Buzatu
Volume: 4
Issue: 1
Year: 2012
Internet Banking Two-Factor Authentication using Smartphones

Author(s): Costin Andrei Soare
Volume: 4
Issue: 1
Year: 2012
On the Security of Black-Box Implementation of Visual Secret Sharing Schemes

Author(s): Adrian Atanasiu | Ruxandra Olimid | Emil Simion
Volume: 4
Issue: 1
Year: 2012
Security Issues for 2D Barcodes Ticketing Systems

Author(s): Cristian Toma
Volume: 3
Issue: 1
Year: 2011
Interoperability Issues for VPN IPsec Solutions

Author(s): Iulian Danalachi | Mihai Lucian Petrescu
Volume: 3
Issue: 1
Year: 2011
Web Single Sign-On Implementation Using the SimpleSAMLphp Application

Author(s): Ionut Andronache | Claudiu Nisipasiu
Volume: 3
Issue: 1
Year: 2011
PKI Interoperability Based on Online Certificate Validation

Author(s): Dinu Smadu
Volume: 3
Issue: 1
Year: 2011
Cryptographic Applications using FPGA Technology

Author(s): Alexandru Coman | Radu Fratila
Volume: 3
Issue: 1
Year: 2011
Vulnerability Analysis in Web Distributed Applications

Author(s): Ion Ivan | Dragos Palaghita | Sorin Vinturis | Mihai Doinea
Volume: 3
Issue: 1
Year: 2011
Save time & money - Smart Internet Solutions      Why do you need a reservation system?