The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sead Muftic: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ioannis Mavridis, George Pangalos, Triadafyllos Koukouvinos, Sead Muftic
    A Secure Payment System for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1999, pp:832-836 [Conf]
  2. Kasun De Zoysa, Sead Muftic
    Bi-directional Web Document Protection System for Serious E-commerce Applications. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2002, pp:11-16 [Conf]
  3. Matei Ciobanu Morogan, Sead Muftic
    Certificate Management in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2003, pp:337-341 [Conf]
  4. Sead Muftic
    Secury Mechanisms for Computer Networks (A Program of the CEC COST-11 Ter Project). [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1986, v:12, n:, pp:339-344 [Journal]
  5. Sead Muftic
    Security Mechanisms for Computer Networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1988, v:15, n:, pp:67-71 [Journal]
  6. Sead Muftic
    Extended OSI Security Architecture. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1989, v:17, n:, pp:223-227 [Journal]
  7. Sead Muftic
    Implementation of the Comprehensive Integrated Security System for Computer Networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1992, v:25, n:4-5, pp:469-475 [Journal]
  8. Sead Muftic
    Security Architecture for ODP Systems. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1994, v:26, n:11, pp:1343-1349 [Journal]
  9. Sead Muftic
    Editorial. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:451-452 [Journal]
  10. Sead Muftic, Morris Sloman
    Security architecture for distributed systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:492-500 [Journal]
  11. Sead Muftic, Edina Hatunic
    CISS: Generalized security libraries. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:7, pp:653-659 [Journal]
  12. Mohammad Alhammouri, Sead Muftic
    Management of Groups and Group Keys in Multi-level Security Environments. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2007, pp:75-80 [Conf]

  13. MagicNET: Security System for Protection of Mobile Agents. [Citation Graph (, )][DBLP]


  14. Measurement of Energy Costs of Security in Wireless Sensor Nodes. [Citation Graph (, )][DBLP]


  15. Balancing Security and Energy Consumption in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  16. Intrusion Detection and Prevention System using Secure Mobile Agents. [Citation Graph (, )][DBLP]


  17. Cryptonet: Secure E-Mail System. [Citation Graph (, )][DBLP]


  18. MagicNET: Security System for Development, Validation and Adoption of Mobile Agents. [Citation Graph (, )][DBLP]


  19. CryptoNET: Secure federation protocol and authorization policies for SMI. [Citation Graph (, )][DBLP]


  20. Transaction protection by "antennas". [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002