| Publication | Date of Publication | Type |
|---|
Characterization of a cubic interpolation scheme dependent on two parameters and applications Annals of the University of Craiova - Mathematics and Computer Science Series | 2023-04-14 | Paper |
| Object detection by grouping partial perception phanges | 2021-07-28 | Paper |
| Impact factors involved in cryptoperiod computation in key compromise impersonation scenario | 2021-07-28 | Paper |
| Nonlinearities on cryptographic shift registers | 2018-10-05 | Paper |
Minimal prime state filters and state radicals on state pseudo BL-algebras Soft Computing | 2017-09-08 | Paper |
Nonlinearities in elliptic curve authentication Entropy | 2016-06-15 | Paper |
State filters on fuzzy structures with internal states Soft Computing | 2016-02-26 | Paper |
On pseudo BL-algebras with internal state Soft Computing | 2013-08-05 | Paper |
| scientific article; zbMATH DE number 6125198 (Why is no real title available?) | 2013-01-14 | Paper |
| scientific article; zbMATH DE number 6125199 (Why is no real title available?) | 2013-01-14 | Paper |
Vertical fragmentation security study in distributed deductive databases Analele Universității din Craiova. Seria Matematică Informatică | 2012-06-21 | Paper |
Authentication model based on multi-agent system Analele Universității din Craiova. Seria Matematică Informatică | 2012-05-24 | Paper |
| CELICA: a multi-agent communication system for electronic commerce | 2012-01-13 | Paper |
| A note on BL-algebras with internal state | 2011-02-23 | Paper |
| Statistical correlation study | 2011-02-23 | Paper |
| scientific article; zbMATH DE number 5837685 (Why is no real title available?) | 2011-01-17 | Paper |
Webkm - online data mining system Studies in Computational Intelligence | 2010-10-26 | Paper |
| Authentication hierarchy based on blind signature | 2010-09-02 | Paper |
| scientific article; zbMATH DE number 5776796 (Why is no real title available?) | 2010-08-31 | Paper |
| scientific article; zbMATH DE number 5776797 (Why is no real title available?) | 2010-08-31 | Paper |
| Elliptic curve cryptosystems and scalar multiplication | 2010-07-02 | Paper |
| Linear feedback shift register optimizations | 2010-06-15 | Paper |
| Combining linear feedback shift registers | 2010-06-15 | Paper |
| 3D steganography models | 2010-04-21 | Paper |
| Non singular elliptic curves, from theory to application. Algorithm attacks discussions | 2009-06-19 | Paper |
| Authentification ranks with identities based on elliptic curves | 2009-05-27 | Paper |
| Classification and comparison of information structure from a web page | 2006-06-28 | Paper |
The GN-authenticated key agreement Applied Mathematics and Computation | 2005-11-14 | Paper |
| scientific article; zbMATH DE number 2217755 (Why is no real title available?) | 2005-10-26 | Paper |
| scientific article; zbMATH DE number 2134130 (Why is no real title available?) | 2005-02-15 | Paper |
| scientific article; zbMATH DE number 2036177 (Why is no real title available?) | 2004-02-02 | Paper |