Search results for "authentication"
LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN
Author(s): VOICU, MirelPosted in Volume 1, Issue 1, Year 2012
A Fingerprint-Based Scheme for ATM User Authentication
Author(s): IWASOKUN, Gabriel B.Posted in Volume 5, Issue 2, Year 2016
Public Key Infrastructures for Trust and Authentication in the IoT
Author(s): NĂSTASE, LaviniaPosted in Volume 6, Issue 1, Year 2017
Report on Cyber Security Alerts Processed by CERT-RO in 2015
Author(s): CERT, ROPosted in Volume 5, Issue 1, Year 2016
Editorial: The International Journal of Information Security and Cybercrime
Author(s): BACIVAROV, IoanPosted in Editorials, Volume 1, Issue 1, Year 2012
“Challenges and Strategies in Cybersecurity” Book Review
Author(s): BACIVAROV, IoanPosted in Reviews Section, Volume 4, Issue 2, Year 2015
Interview with Dr. Ray GENOE
Author(s): MIHAI, Ioan-CosminPosted in Interviews, Volume 4, Issue 1, Year 2015
SECITC 2016 – International Conference on Information Technology and Communications Security
Author(s): MIHAI, Ioan-CosminPosted in Reviews Section, Volume 5, Issue 1, Year 2016
Editorial: The Importance of Cybersecurity in the Post-Pandemic World
Author(s): MIHAI, Ioan-CosminPosted in Editorials, Volume 11, Issue 1, Year 2022