Fingerprints identification using a fuzzy logic system I Iancu, N Constantinescu, M Colhon International Journal of Computers Communications & Control 5 (4), 525-531, 2010 | 42 | 2010 |
Intuitionistic fuzzy system for fingerprints authentication I Iancu, N Constantinescu Applied Soft Computing 13 (4), 2136-2142, 2013 | 28 | 2013 |
Classifcation and comparison of information structures from a web page M Cosulschi, N Constantinescu, M Gabroveanu Annals of the University of Craiova-Mathematics and Computer Science Series 31, 2004 | 18 | 2004 |
Nonlinearities in elliptic curve authentication R Alsaedi, N Constantinescu, V Rădulescu Entropy 16 (9), 5144-5158, 2014 | 11 | 2014 |
Authentication protocol based on ellipitc curve cryptography N Constantinescu Annals of the University of Craiova-Mathematics and Computer Science Series …, 2010 | 9 | 2010 |
Complexity computations in code cracking problems E Simion, NS Constantinescu 24th International Spring Seminar on Electronics Technology. Concurrent …, 2001 | 9 | 2001 |
Towards using grid services for mining fuzzy association rules M Gabroveanu, I Iancu, M Cosulschi, N Constantinescu Ninth International Symposium on Symbolic and Numeric Algorithms for …, 2007 | 8 | 2007 |
Authentication ranks with identities based on elliptic curves N Constantinescu Annals of the University of Craiova-Mathematics and Computer Science Series …, 2007 | 8 | 2007 |
HTML Pattern Generator--Automatic Data Extraction from Web Pages M Cosulschi, A Giurca, B Udrescu, N Constantinescu, M Gabroveanu 2006 Eighth International Symposium on Symbolic and Numeric Algorithms for …, 2006 | 7 | 2006 |
Intelligent data retrieval with hierarchically structured information O Ţicleanu, N Constantinescu, D Ebāncă Intelligent Interactive Multimedia Systems and Services, 345-351, 2013 | 6 | 2013 |
Security system vulnerabilities N Constantinescu Proceedings of the Romanian Academy Series A-Mathematics Physics Technical …, 2012 | 6 | 2012 |
The GN-authenticated key agreement G Stephanides, N Constantinescu Applied mathematics and computation 170 (1), 531-544, 2005 | 6 | 2005 |
Estimators in cryptography N Constantinescu arXiv preprint arXiv:1202.5921, 2012 | 5 | 2012 |
Authentication model based on Multi-Agent System N Constantinescu, CI Popirlan Annals of the University of Craiova-Mathematics and Computer Science Series …, 2011 | 5 | 2011 |
Elliptic curve cryptosystems and scalar multiplication N Constantinescu Annals of the University of Craiova-Mathematics and Computer Science Series …, 2010 | 5 | 2010 |
RSA-Padding Signatures with Attack Studies G Stephanides, N Constantinescu, M Cosulschi, M Gabroveanu International Conference on Web Information Systems and Technologies 2, 97-100, 2006 | 5 | 2006 |
The GN-authenticated key agreement N Constantinescu, G Stephanides Journal of Applied Mathematics and Computation 170 (1), 531-544, 2006 | 5 | 2006 |
A new approach to mining fuzzy association rules from distributed databases M Gabroveanu, M Cosulschi, N Constantinescu Annals of the University of Bucharest, Mathematics and Computer Science …, 2005 | 5 | 2005 |
Identification of parts in identity-based encryption, Research Notes in Data Security, Wessex Institute of Technology, UK, developed with University of Bergen, Norway N Constantinescu, G Stephanides | 5 | 2004 |
Usage of advanced data structure for improving efficiency for large (n, m) permutations inspired from the Josephus problem M Cosulschi, M Gabroveanu, N Constantinescu SCIENCE AND TECHNOLOGY 12 (1), 13-24, 2009 | 4 | 2009 |