VOICU, M. (2012). LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime, 1(1), 19-25. Retrieve from https://www.ijisc.comVOICU, M., 2012. LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime 1(1), 19-25. Available from: https://www.ijisc.comM. VOICU, "LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 19-25, 2012. Available: https://www.ijisc.comVOICU, M., 'LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 19-25, (2012).VOICU, M.: LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime 1 (2012) 19-25. https://www.ijisc.comVOICU, M., (2012), LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime, 1: 19-25. https://www.ijisc.com Citation Format :
SEREȚEANU, A. (2013). Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime, 2(1), 17-24. Retrieve from https://www.ijisc.comSEREȚEANU, A., 2013. Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime 2(1), 17-24. Available from: https://www.ijisc.comA. SEREȚEANU, "Security in Most Recent Generation of Mobile Telecommunication Networks – LTE," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 17-24, 2013. Available: https://www.ijisc.comSEREȚEANU, A., 'Security in Most Recent Generation of Mobile Telecommunication Networks – LTE', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 17-24, (2013).SEREȚEANU, A.: Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime 2 (2013) 17-24. https://www.ijisc.comSEREȚEANU, A., (2013), Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime, 2: 17-24. https://www.ijisc.com Citation Format :
PASĂRE, A.L.,CIUCHI, C.,BOTAN, C., (2014). A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime, 3(2), 7-18. Retrieve from https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., 2014. A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime 3(2), 7-18. Available from: https://www.ijisc.comA.L. PASĂRE, C. CIUCHI, C. BOTAN, "A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 7-18, 2014. Available: https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., 'A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 7-18, (2014).PASĂRE, A.L.,CIUCHI, C.,BOTAN, C.,: A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime 3 (2014) 7-18. https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., (2014), A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime, 3: 7-18. https://www.ijisc.com Citation Format :
SHARMA, P.,GUPTA, G., (2016). Security Problems in Sensor Network. International Journal of Information Security and Cybercrime, 5(1), 69-74. Retrieve from https://www.ijisc.comSHARMA, P., GUPTA, G., 2016. Security Problems in Sensor Network. International Journal of Information Security and Cybercrime 5(1), 69-74. Available from: https://www.ijisc.comP. SHARMA, G. GUPTA, "Security Problems in Sensor Network," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 69-74, 2016. Available: https://www.ijisc.comSHARMA, P., GUPTA, G., 'Security Problems in Sensor Network', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 69-74, (2016).SHARMA, P.,GUPTA, G.,: Security Problems in Sensor Network. International Journal of Information Security and Cybercrime 5 (2016) 69-74. https://www.ijisc.comSHARMA, P., GUPTA, G., (2016), Security Problems in Sensor Network. International Journal of Information Security and Cybercrime, 5: 69-74. https://www.ijisc.com Citation Format :
IWASOKUN, G.B. (2016). A Fingerprint-Based Scheme for ATM User Authentication. International Journal of Information Security and Cybercrime, 5(2), 71-86. Retrieve from https://www.ijisc.comIWASOKUN, G.B., 2016. A Fingerprint-Based Scheme for ATM User Authentication. International Journal of Information Security and Cybercrime 5(2), 71-86. Available from: https://www.ijisc.comG.B. IWASOKUN, "A Fingerprint-Based Scheme for ATM User Authentication," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 71-86, 2016. Available: https://www.ijisc.comIWASOKUN, G.B., 'A Fingerprint-Based Scheme for ATM User Authentication', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 71-86, (2016).IWASOKUN, G.B.: A Fingerprint-Based Scheme for ATM User Authentication. International Journal of Information Security and Cybercrime 5 (2016) 71-86. https://www.ijisc.comIWASOKUN, G.B., (2016), A Fingerprint-Based Scheme for ATM User Authentication. International Journal of Information Security and Cybercrime, 5: 71-86. https://www.ijisc.com Citation Format :
NĂSTASE, L. (2017). Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime, 6(1), 51-56. Retrieve from https://www.ijisc.comNĂSTASE, L., 2017. Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime 6(1), 51-56. Available from: https://www.ijisc.comL. NĂSTASE, "Public Key Infrastructures for Trust and Authentication in the IoT," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 51-56, 2017. Available: https://www.ijisc.comNĂSTASE, L., 'Public Key Infrastructures for Trust and Authentication in the IoT', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 51-56, (2017).NĂSTASE, L.: Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime 6 (2017) 51-56. https://www.ijisc.comNĂSTASE, L., (2017), Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime, 6: 51-56. https://www.ijisc.com Citation Format :
PAULIȘ, M.A. (2017). Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime, 6(2), 40-46. Retrieve from https://www.ijisc.comPAULIȘ, M.A., 2017. Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime 6(2), 40-46. Available from: https://www.ijisc.comM.A. PAULIȘ, "Solutions for Network Traffic Security: VPN Through IPsec and PKI," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 40-46, 2017. Available: https://www.ijisc.comPAULIȘ, M.A., 'Solutions for Network Traffic Security: VPN Through IPsec and PKI', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 40-46, (2017).PAULIȘ, M.A.: Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime 6 (2017) 40-46. https://www.ijisc.comPAULIȘ, M.A., (2017), Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime, 6: 40-46. https://www.ijisc.com Citation Format :