BACIVAROV, I.,MIHAI, I.C., (2012). Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime, 1(1), 8-14. Retrieve from https://www.ijisc.comBACIVAROV, I., MIHAI, I.C., 2012. Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime 1(1), 8-14. Available from: https://www.ijisc.comI. BACIVAROV, I.C. MIHAI, "Access Rights Analysis in Microsoft Windows and Linux Operating Systems," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 8-14, 2012. Available: https://www.ijisc.comBACIVAROV, I., MIHAI, I.C., 'Access Rights Analysis in Microsoft Windows and Linux Operating Systems', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 8-14, (2012).BACIVAROV, I.,MIHAI, I.C.,: Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime 1 (2012) 8-14. https://www.ijisc.comBACIVAROV, I., MIHAI, I.C., (2012), Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime, 1: 8-14. https://www.ijisc.com Citation Format :
IANCU, L.,BACIVAROV, I., (2013). Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime, 2(2), 7-18. Retrieve from https://www.ijisc.comIANCU, L., BACIVAROV, I., 2013. Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime 2(2), 7-18. Available from: https://www.ijisc.comL. IANCU, I. BACIVAROV, "Encryption in Mobile Communications. ZUC Algorithm.," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 7-18, 2013. Available: https://www.ijisc.comIANCU, L., BACIVAROV, I., 'Encryption in Mobile Communications. ZUC Algorithm.', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 7-18, (2013).IANCU, L.,BACIVAROV, I.,: Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime 2 (2013) 7-18. https://www.ijisc.comIANCU, L., BACIVAROV, I., (2013), Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime, 2: 7-18. https://www.ijisc.com Citation Format :
PASĂRE, A.L.,CIUCHI, C.,BOTAN, C., (2014). A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime, 3(2), 7-18. Retrieve from https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., 2014. A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime 3(2), 7-18. Available from: https://www.ijisc.comA.L. PASĂRE, C. CIUCHI, C. BOTAN, "A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 7-18, 2014. Available: https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., 'A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 7-18, (2014).PASĂRE, A.L.,CIUCHI, C.,BOTAN, C.,: A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime 3 (2014) 7-18. https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., (2014), A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime, 3: 7-18. https://www.ijisc.com Citation Format :