A succinct survey on (Pseudo)-random number generators from a cryptographic perspective AM Gergely, B Crainicu 2017 5th International Symposium on Digital Forensic and Security (ISDFS), 1-6, 2017 | 16 | 2017 |
KSAm–An Improved RC4 Key-Scheduling Algorithm for Securing WEP B Crainicu, FM Boian Novel Algorithms and Techniques in Telecommunications and Networking, 391-396, 2010 | 8 | 2010 |
Cross-layer anomaly detection in industrial cyber-physical systems H Sándor, B Genge, P Haller, AV Duka, B Crainicu 2017 25th International Conference on Software, Telecommunications and …, 2017 | 7 | 2017 |
Wireless LAN security mechanisms at the enterprise and home level B Crainicu Novel Algorithms and Techniques in Telecommunications, Automation and …, 2008 | 6 | 2008 |
Randadminsuite: A new privacy-enhancing solution for private blockchains AM Gergely, B Crainicu Procedia Manufacturing 46, 562-569, 2020 | 5 | 2020 |
On invariance weakness in the KSAm algorithm B Crainicu Procedia Technology 19, 850-857, 2015 | 5 | 2015 |
Cryptanalysis of KSAm-like algorithms B Crainicu, BL Iantovics 2008 First International Conference on Complexity and Intelligence of the …, 2008 | 5 | 2008 |
Complex mobile multiagent systems BL Iantovics, B Crainicu 2008 first international conference on complexity and intelligence of the …, 2008 | 4 | 2008 |
A distributed security approach for intelligent mobile multiagent systems B Iantovics, B Crainicu Advanced Intelligent Computational Technologies and Decision Support Systems …, 2014 | 3 | 2014 |
The concept of a distributed repository for validating X. 509 attribute certificates in a privilege management infrastructure AM Gergely, B Crainicu Procedia Technology 22, 926-930, 2016 | 2 | 2016 |
Inside the IPsec Headers: AH (Authentication Header) and ESP (Encapsulating Security Payload) B Crainicu The Proceedings of the “European Integration-Between Tradition and Modernity …, 2013 | 2 | 2013 |
SOME COMBINATORIAL ASPECTS OF THE KSAm-LIKE= ALGORITHMS SUITABLE FOR RC4 STREAM CIPHER. B Crainicu, FM Boian Studia Universitatis Babes-Bolyai, Informatica 55 (1), 2010 | 2 | 2010 |
An overview of the IPs ec extension headers–AH (Authentication Header) and ESP (Encapsulati ng Security Payload) B Crainicu The 4 th International Conference RoEduNet Romania, Sovata, 2005 | 2 | 2005 |
BlockCACert–A Blockchain-Based Novel Concept for Automatic Deployment of X. 509 Digital Certificates AM Gergely, B Crainicu International Conference Interdisciplinarity in Engineering, 820-832, 2021 | 1 | 2021 |
New cryptanalytic results on the effect of invariance weakness in the KSAm mechanism B Crainicu, A Gergely 2017 16th RoEduNet Conference: Networking in Education and Research …, 2017 | 1 | 2017 |
Enforcing end-to-end security in scada systems via application-level cryptography AV Duka, B Genge, P Haller, B Crainicu Critical Infrastructure Protection XI: 11th IFIP WG 11.10 International …, 2017 | 1 | 2017 |
Unified Formal Model for Synchronous and Self-Synchronizing Stream Ciphers B Crainicu Procedia Engineering 181, 620-625, 2017 | 1 | 2017 |
A metaheuristic tabu search approach for internal state reconstruction of RC4 stream cipher B Crainicu, C Enachescu 2011 RoEduNet International Conference 10th Edition: Networking in Education …, 2011 | 1 | 2011 |
Effective Contract-Net-Based Intrusion Detection Using Intelligent Agent-Based Systems LB Iantovics, O Hornyák, GC Crișan, B Crainicu, E Nechita Computational Intelligence and Mathematics for Tackling Complex Problems 5 …, 2024 | | 2024 |
Design, verification and implementation of a lightweight remote attestation protocol for process control systems B Genge, AV Duka, P Haller, B Crainicu, H Sándor, F Graur 2017 IEEE 15th International Conference on Industrial Informatics (INDIN), 75-82, 2017 | | 2017 |