• Publications
  • Influence
About a method for distribution keys of a computer network using elliptic curves
  • Eugen Petac
  • Computer Science
  • ISCE '97. Proceedings of IEEE International…
  • 2 December 1997
TLDR
The paper presents a distribution method based on elliptic curve public key cryptosystem (ECPKC) based on chord tangent group law. Expand
  • 2
About Security Solutions in Fog Computing
The key for improving a system's performance, its security and reliability is to have the data processed locally in remote data centers. Fog computing extends cloud computing through its services toExpand
  • 5
  • PDF
Some experimental results about security solutions against DDoS attacks
TLDR
We propose a method for analyzing and filtering DDoS attacks at the network level, based on the results of informational correlation to the statistical control study. Expand
  • 2
  • PDF
Experimental results about Multiprotocol Routing and Route Redistribution
This paper considers an experimental platform and some results about the problem of multi protocol routing and route redistribution. Our particular lab platfo rm, with Zebra/ Quagga routing softwareExpand
  • 1
  • PDF
Some Aspects of Intrusion Detection in IoE
People, processes, pieces of information and things are now presented together in the new concept, called Internet of Everything (IoE). Information security must be carefully analyzed andExpand
Visual Firewall Rule Builder
The paper that is being submitted deals primarily with the implementation of firewall technology on Linux based systems. It focuses on the features of the visual medium for the creation andExpand
Social Informatics and the Dynamic of Contemporary Society
As the main engine of social development, education must adapt its new technological advancements to the benefit of the citizens and their needs by taking into account the building of a modernExpand
  • 5
  • PDF
The Challenge of Private Cloud for the Digital Business
For various organizations, a Private Cloud represents a stepping stone to a fully public model, while others consider it to be the ideal solution. Organizations such as the governmental institutionsExpand
  • 1
  • PDF
Firewall Survey
A Virtual Routing Solution for IP Networks
TLDR
The core of our paper is represented by the development of the HypeRSimRIP applica‐ tion that can be used for various networking purposes, such as designing a network or setting routing processes. Expand