default search action
Mihai-Lica Pura
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c27]Elena-Casiana Fusu, Mihai-Lica Pura:
ROetry: First Steps Towards Computer Generated Poetry in Romanian Language. ECAI 2020: 1-6 - [c26]Iulian Aciobanitei, Vlad Dedita, Mihai-Lica Pura, Victor Valeriu Patriciu:
SABRES - A Proof of Concept for Enhanced Cloud Qualified Electronic Signatures. COMM 2020: 103-108 - [c25]Iulian Aciobanitei, Ionut Luculescu, Mihai-Lica Pura:
Qualified Electronic Signature SaaS Solution for Google Docs & Google Sheets Documents. COMM 2020: 109-112 - [c24]Elena-Cristina Ruica, Mihai-Lica Pura, Iulian Aciobanitei:
Implementing Cloud Qualified Electronic Signatures for Documents using Available Cryptographic Libraries: A Survey. COMM 2020: 113-118
2010 – 2019
- 2019
- [c23]Andrei-Marius Avram, Mihai-Lica Pura, Stefan-Adrian Toma:
Tiny Network Intrusion Detection System with High Performance. ECAI 2019: 1-6 - [c22]Andreea Scurtu, Mihai-Lica Pura:
Web GUI for Automating the Formal Verification of Security Protocols using Casper & FDR4. ECAI 2019: 1-6 - [c21]Stefan-Adrian Toma, Bogdan Sebacher, Adrian Focsa, Mihai-Lica Pura:
On Anomalous Deformation Profile Detection Through Supervised and Unsupervised Machine Learning. IGARSS 2019: 7419-7422 - [c20]Robert-George Simion, Mihai-Lica Pura:
A BitTorrent DHT Crawler. SACI 2019: 155-160 - [c19]Iulian Aciobanitei, Paul-Danut Urian, Mihai-Lica Pura:
Learned Lessons from Implementing an Android Client for the Cloud Signature Consortium API. SECITC 2019: 227-240 - [c18]Petrica-Daniel Stoica, Stefan-Adrian Toma, Marian Ceaparu, Mihai-Lica Pura:
Spoken Language Detection Experiments for Romanian. SpeD 2019: 1-6 - 2018
- [c17]Iulian Aciobanitei, Paul-Danut Urian, Mihai-Lica Pura:
A Cryptography API: Next Generation Key Storage Provider for Cryptography in the Cloud. ECAI 2018: 1-4 - [c16]Iulian Aciobanitei, Roxana-Ioana Guinea, Mihai-Lica Pura:
AVISPA versus AVANTSSAR in the Model Checking of Secure Communication Protocols. ICETE (2) 2018: 686-691 - [c15]Bogdan Sebacher, Stefan-Adrian Toma, Marin Lupoae, Mihai-Lica Pura:
On the Modelling of Urban Infrastructure Deformation Profiles Using the Applied Element Method and Multiple Hypothesis Testing. IGARSS 2018: 874-877 - [c14]Iulian Aciobanitei, Iulian Catalin Buhus, Mihai-Lica Pura:
Lightweight Version of SQRL Authentication Protocol Based on Cryptography in the Cloud. SACI 2018: 173-178 - [c13]Iulian Aciobanitei, Iulian Catalin Buhus, Mihai-Lica Pura:
Using Cryptography in the Cloud for Lightweight Authentication Protocols Based on QR Codes. SACI 2018: 539-542 - [c12]Stefan Bodoarca, Mihai-Lica Pura:
Assuring Privacy in Surfing the Internet. SecITC 2018: 185-203 - 2017
- [c11]Mihai-Lica Pura, Iulian Aciobanitei, Stefan-Adrian Toma, Didier Buchs:
CTL formula evaluation by term rewriting inversion. ECAI 2017: 1-10 - [c10]Stefan Adrian Toma, Adriana Stan, Mihai-Lica Pura, Traian Barsan:
MaRePhoR - An open access machine-readable phonetic dictionary for Romanian. SpeD 2017: 1-6 - 2016
- [c9]Mihai Lica Pura, Luciana Morogan, Didier Buchs:
Generation of the path to counter-examples by backward state space traversal in symbolic model checking based on term rewriting. COMM 2016: 85-88 - [c8]Diana-Getuta Oancea, Mihai Lica Pura, Luciana Morogan:
Using gamma formalism for model-based testing for the routing protocols for mobile ad hoc networks. COMM 2016: 177-180 - 2015
- [j1]Mihai-Lica Pura, Didier Buchs:
Symbolic Model Checking of Security Protocols for Ad hoc Networks on any Topologies. Trans. Petri Nets Other Model. Concurr. 10: 109-130 (2015) - [c7]Constantin Grumazescu, Mihai-Lica Pura, Victor Valeriu Patriciu:
Hybrid Distributed-Hierarchical Identity Based Cryptographic Scheme for Wireless Sensor Networks. WorldCIST (1) 2015: 949-958 - 2014
- [c6]Mihai-Lica Pura, Didier Buchs:
Using Symbolic Techniques and Algebraic Petri Nets to Model Check Security Protocols for Ad Hoc Networks. PNSE @ Petri Nets 2014: 91-110 - [c5]Mihai-Lica Pura, Didier Buchs:
Model checking ARAN ad hoc secure routing protocol with algebraic Petri nets. COMM 2014: 1-4 - [c4]Mihai Lica Pura, Didier Buchs:
A self-organized key management scheme for ad hoc networks based on identity-based cryptography. COMM 2014: 1-4 - [c3]Mihai-Lica Pura, Didier Buchs:
Using Algebraic Petri Nets for Testing the Models of Ad Hoc Secure Routing Protocols in Mobility Scenarios. ICST Workshops 2014: 2-3 - 2010
- [c2]Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica:
Formal Verification of G-PAKE Using Casper/FDR2 - Securing a Group PAKE Protocol Using Casper/FDR2. SECRYPT 2010: 299-303
2000 – 2009
- 2009
- [c1]Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica:
Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks. SECRYPT 2009: 135-139
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint