-
Quyen, N.X., Nguyen, C.T., Barlet-Ros P., Dojen, R., “A Novel Approach to Security Enhancement of Chaotic DSSS Systems”,
IEEE International Conference on Communications and Electronics (ICCE 2016), July 27-29 2016, Ha Long, Vietnam
-
Jurcut, A., Coffey, T. and Dojen, R., “Design Guidelines for Security Protocols to Prevent Replay & Parallel Session Attacks”,
Elsevier Computer & Security, Volume 45, September 2014, pp. 255-273
-
Jurcut, A., Coffey, T. and Dojen, R., “On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool”,
In: Computer Networks, Series: Communications in Computer and Information Science, Springer Internationsl
Publishing, Volume 431, ISBN: 978-3-319-07940-0, 2014, pp.128-137
-
Jurcut, A.D., Coffey, T. and Dojen, R., “Design requirements to counter parallel session attacks in security protocols”,
Twelfth Annual Conference on Privacy, Security and Trust (PST 2014), IEEE, ISBN: 978-1-4799-3502-4,
pp. 298 – 305, Toronto, Canada , July 2014
-
Dojen, R. and Zhang, F., “EWAIP: an Empirical Wireless Sensor Network Applications Implementation Platform”,
Third International Conference on Future Generation Communication Technologies, Luton, UK, 13-15 August 2014
-
Jurcut, A., Coffey, T.
and Dojen, R., "Establishing and Fixing Security Protocol Weaknesses Using a Logic-based Verification Tool", Journal of
Communications, Volume 8, Issue 11, November 2013, pp. 795-805
-
Lasc, I., Dojen, R. and
Coffey, T., "On the Detection of Desynchronisation Attacks against Security Protocols that use Dynamic Shared Secrets",
Elsevier Computers & Security, Volume 32, February 2013, pp. 115-129
-
Jurcut, A., Coffey, T.
and Dojen, R., “Symmetry in Security Protocol Cryptographic Messages – A Serious Weakness Exploitable by Parallel Session Attacks”,
In: International Conference on Availability, Reliability and Security (ARES), August 2012, pp. 410-416, ISBN 978-1-4673-2244-7
(DOI 10.1109/ARES.2012.39)
-
Lasc, I., Dojen, R. and
Coffey, T., "Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications",
Elsevier Computers & Electrical Engineering (Special Issue on Modern Trends in Applied Security: Architectures, Implementations
and Applications), Volume 37, Issue 2, March 2011, pp.160-168
-
Lasc, I., Dojen, R.
and Coffey, T., "A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications",
IGI International Journal of Information Security and Privacy, Volume 5, Issue 1, January 2011, pp. 33-49
-
Zhang, F., Dojen, R.
and Coffey, T., "Comparative Performance and Energy Consumption Analysis of Different AES Implementations on a Wireless Sensor Newtork
Node", Inderscience International Journal of Sensor Networks (IJSNET), Volume 10, No 4, 2011, pp. 192-201
-
Jurcut, A., Coffey, T.,
Dojen, R. and Gyorodi, R., "Security Protocol Design: A Case Study Using Key Distribution Protocols", Journal of Computer Science and
Control Systems, Vol. 2009, No 2, 2009, pp.16-21
-
Muntean, C., Dojen, R.,
Coffey, T. and Gyorodi, R., "Analysing the Zhou-Gollmann Non-Repudiation Protocol", Journal of Computer Science and Control Systems,
Vol. 2009, No. 1, 2009, pp.31-36
-
Muntean, C., Dojen, R.
and Coffey, T., "Establishing and Preventing a New Replay Attack on a Non-Repudiation Protocol", In: IEEE International Conference
on Intelligent Computer Communication and Processing, August 2009, pp. 185-192 (DOI 10.1109/ICCP.2009.5284749)
-
Dojen, R., Pasca, V.
and Coffey, T., "Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications" In: Security and Privacy in Mobile
Information and Communication Systems, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and
Telecommunications Engineering (LNICST), Vol. 17, September 2009, pp. 278-287 (DOI 10.1007/978-3-642-04434-2_24)
Past Publications
-
Jurcut, A., Coffey, T.,
Dojen, R., and Gyorodi, R., "Weaknesses and Improvements of a Key Distribution Security Protocol", Annals of the University of Craiova,
Series: Automation, Computers, Electronics and Mechatronics, Vol. 5(32), No. 1, December 2008, pp.36-42, ISSN 1841-0626
-
Jurcut, A., Coffey, T.,
Dojen, R. and Gyorodi, R., "Analysis of a key-establishment security protocol", Journal of Computer Science and Control Systems,
Vol. 2008, 2008, pp. 42-47, ISSN 1844-6043
-
Dojen, R., Lasc, I.,
Coffey, T. and Gyorodi, R., "Verifying a Key Distribution and Authentication Protocol Using a Logic-Based Proving Engine", Journal
of Computer Science and Control Systems, Vol. 2008, 2008, pp. 22-27, ISSN 1844-6043
-
Pasca, V., Dojen, R.,
Coffey, T. and Gyorodi, R., "Detecting Attacks on Security Protocols Using Model Checking", Journal of Computer Science and Control
Systems, Vol. 2008, 2008, pp. 71-76, ISSN 1844-6043
-
Dojen, R., Jurcut, A.,
Coffey, T. and Gyorodi, C., "On establishing and fixing a parallel session attack in a security protocol", In: Intelligent
Distributed Computing, Systems and Applications, Series: Studies in Computational Intelligence, Volume 162/2008, September 2008,
pp.239-244, ISBN 978-3-540-85256-8
-
Coffey, T. and Dojen,
R., "A Formal Verification Centred Design Process for Security Protocols". In: Handbook of Research on Information Security and
Assurance, Eds: Gupta, J.N.D. and Sharma, S.K., IGI Global, August 2008, pp. 165-178, ISBN 978-1-59904-855-0
-
Dojen, R., Zhang, F.
and Coffey, T., "On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks",
In: IEEE International Conference on Performance Computing and Communications, December 2008, pp. 499-506,
ISBN: 978-1-4244-3368-1 (DOI 10.1109/PCCC.2008.4745088)
-
Pasca, V., Dojen, R.,
Jurcut, A. and Coffey, T., "Determining a Parallel Session Attack on a Key Distribution Protocol using a Model Checker", In:
Proceedings of International Conference on Advances in Mobile Computing and Multimedia, ACM Press, November 2008, pp. 150-155,
ISBN:978-1-60558-269-6
-
Dojen, R., Lasc, I.
and Coffey, T. , "Establishing and Fixing a Freshness Flaw in a Key-Distribution and Authentication Protocol", In: IEEE
International Conference on Intelligent Computer Communication and Processing, August 2008, pp. 185-192,
ISBN:978-1-4244-2673-7 (DOI 10.1109/ICCP.2008.4648371)
-
Dojen, R., Jurcut, A.,
Coffey, T. and Gyorodi, C., "On establishing and fixing a parallel session attack in a security protocol" , 2nd International
Symposium on Intelligent Distributed Computing – IDC 2008. 18-20 September 2008, Catania, Italy, pp.185-192
-
Flanagan, T.,
Scott, T.J. and Dojen, R., "Leveraging Dependency Structure Matrix (DSM) and System Dynamics in Combination to Reduce Project Rework",
26th International Conference of The System Dynamics Society 2008, 20-24 July 2008, Athens, Greece, Paper No. 369
-
Dojen, R.,
"A Communication Protocol Conformance Verification System", Annals of the University of Oradea, Fascicle of Electrotechnics,
Section of Computer Science and Control Systems, Vol. 2007, 2007, pp.26-31 (ISSN 1223-2106)
-
Dojen, R., Coffey, T.,
Gyorodi, R. and Tian, L., "Using the Common Authentication Protocol Speccification Language for logic-based security protocol
verification", Annals of the University of Oradea, Fascicle of Electrotechnics, Section of Computer Science and Control Systems,
Vol. 2007, 2007, pp.32-37 (ISSN 1223-2106)
-
Dojen, R., Coffey, T.
and Tian, L., "A security protocol specification language extension for modal logic-based verification", Proceedings
of IET China-Ireland International Conference on Information and Communications Technologies CIICT07, IET Press,
August 2007, pp. 295-302, ISBN: 978-0-86341-827-3
-
Ventuneac, M., Dojen, R.
and Coffey, T., "Automated Verification of Wireless Security Protocols using Layered Proving Trees", WSEAS Transactions on
Communications, Vol. 5, No. 2, February 2006, pp. 252-258, ISSN 1109-2742
-
Tian, L., Dojen, R. and
Coffey, T., "Extending Formal Security Protocol Specification Languages for use with New Verifications Techniques", WSEAS Transactions
on Information Science and Applications, Vol. 3, No. 2, February 2006, pp.372-378, ISSN 1709-0832.
-
O'Sullivan, S., Dojen,
R. and Coffey, T., "Protecting Virtual Networks With A Distributed Cooperative Multi-layer Security Architecture", WSEAS Transactions
on Computers, Vol. 5, No. 1, January 2006, pp. 69-76, ISSN 1109-2750
-
Dojen, R. and Coffey, T.,
"Layered Proving Trees: A Novel Approach to the Automation of
Logic-Based Security Protocol Verification", ACM Transactions on
Information and System Security (TISSEC), Volume 8, Issue 3, August
2005, pp. 287-311.
-
Dojen, R. and Coffey, T.,
"A Case Study on Automation of Verification Logics", 9th
International Conference on Intelligent Engineering Systems INES 2005,
Mediterranean Sea, September 16-19, 2005, pp.139-145.
-
Ventuneac, M. and Coffey, T.,
"Techniques for Analyzing Security Protocols: A Case Study on
Non-repudiation", Proceedings of EMES'05, Oradea, Romania,
2005
-
Picovici, D., Levy, D., Mahdi,
A.E., Coffey, T., "The cascade induction machine: a reliable and
controllable motor or generator", Electric Power Systems Research
(Elsevier Science), 68, 2004, pp.193-207, ISSN: 0378-7796.
-
Morrison, J. and Coffey, T.,
"An Experimental Analysis of Geometric Attacks on DCT-Based
Watermarks", WSEAS Transactions on Information Science and
Applications, Volume 1, Issue 6, December 2004, pp 1656-1661. ISSN
1790-0832
-
Mastorakis, N. (Editor),
Antonidakis, M., Coffey, T. et. al (Guest Editors), WSEAS Transactions on
Information Science and Applications, Issue 5, Vol.1, Nov. 2004. ISSN
1790-0832
-
Dojen, R. and Coffey, T.,
"A Novel Approach to the Automation of Logic-Based Security Protocol
Verification", WSEAS Transactions on Information Science and
Applications, Volume 1, Issue 5, November 2004, pp. 1243-1247. ISSN
1790-0832
-
Healy, K., Coffey, T. and
Dojen, R., "A Comparative Analysis of State-Space Tools for Security
Protocol Verification", WSEAS Transactions on Information Science
and Applications, Volume 1, Issue 5, November 2004, pp. 1256-1261. ISSN
1790-0832
-
Ventuneac, M., Coffey, T.,
Newe, T., "Reasoning on Properties of Non-Repudiation Security
Protocols", WSEAS Transactions on Information Science and
Applications, Issue 5, Volume 1, November 2004, pp 1262-1267. ISSN
1790-0832.
-
Dojen, R. and Coffey, T.,
"Conditional Linear Cryptanalysis - Applying Linear Cryptanalysis to
Ciphers with Key-Dependant Operations". WSEAS Transactions on
Computers, Volume 3, Issue 5, November 2004, pp.1425-1430. ISSN
1109-2750
-
Gyorodi, R., Gyorodi,
C., Bogan-Marta, A. and Pater, M., "The Distributed Algorithms
in Mining Association Rules", Academic Journal (Revista Academiei):
Fuzzy Systems and A. I. Reports and Letters, Romania, vol. 10, No. 1-2,
pp. 55-65, 2004.
-
Coffey, T., Ventuneac, M.,
Newe, T. and Salomie, I., "On investigating the security and fairness
of a fair exchange protocol using logic-based verification", Proceedings
of IEEE International Conference on Intelligent Engineering Systems
(INES2004), Cluj-Napoca, Romania, pp 325-330, U.T.Pres 2004, ISBN:
973-662-120-0.
-
Marian, T., Dumitriu, B.,
Dinsoreanu, M. and Salomie, I., "A framework of reusable structures for
mobile agent development", Proceedings of IEEE International
Conference on Intelligent Engineering Systems (INES2004), Cluj-Napoca,
Romania, Sept. 19-21, pp. 279-284.
-
Dojen, R. and Coffey, T.,
"A Novel Approach to the Automation of Logic-Based Security Protocol
Verification", Proceedings of E-Activities'04 (Invited Session on
Network and Data Security), Rethymno, Crete Island, Greece, 24-26
October 2004, Paper No. 476-178 (CD Proceedings only)
-
Morrison, J. and Coffey, T.,
"An Experimental Analysis of Geometric Attacks on DCT Based
Watermarks", Proceedings of WSEAS International Conference on
E-ACTIVITIES, Crete, Oct. 2004. ISBN: 960-8457-04-1.
-
Ventuneac, M., Coffey, T. and
Newe, T., "Reasoning on Properties of Non-Repudiation Security
Protocols", Proceedings of WSEAS International Conference on
E-ACTIVITIES, Crete, Oct. 2004. ISBN: 960-8457-04-1.
-
Healy, K., Coffey, T. and
Dojen, R., "A Comparative Analysis of State-Space Tools for Security
Protocol Verification", Proceedings of E-Activities'04 (Invited
Session on Network and Data Security), Rethymno, Crete Island, Greece,
24-26 October 2004, Paper No. 476-185 (CD Proceedings only)
-
Bogan-Marta, A., Gyorodi,
R. and Gyorodi, C., "Implications of syntactic and semantic categories of
grammars on a speech recognition tool", ECI 2004 The sixth
International Scientific Conference on Electronic Computers and Informatics,
September 22-24, 2004, Kosice - Herl'any, Slovakia, pp. 86-91.
-
Gyorodi, R. and Gyorodi,
C., "Mining association rules in frequently updated databases using
Dynamic FP-trees", ECI 2004 The sixth International Scientific
Conference on Electronic Computers and Informatics, September 22-24,
2004, Kosice - Herl'any, Slovakia, pag. 19-26.
-
Tierney, E., Newe, T. and
Coffey, T., 2004. "Cox's Algorithm: strengths and weaknesses with
varying composition digital images", 6th WSEAS International
Conference on Telecommunications and Informatics (TELE-INFO '04),
Cancun, Mexico, May 12-15, 2004, ISBN 960-8052-98-X.
-
Gyorodi,
C., Gyorodi, R. and Holban, S., "A Comparative Study of
Association Rules Mining Algorithms", SACI 2004, 1st
Romanian-Hungarian Joint Symposium on Applied Computational Intelligence,
Timisoara, Romania, May 25-26, 2004, pp. 213-222.
-
Gyorodi, R., Caus, S.,
Holban, S., Gyorodi, C., and Bogan-Marta. A., "Management
System for Electrical Residential Installation", CONTI'2004,
6th International Conference on Technical Informatics, May
26-28 2004, Timisoara, Romania, Transactions on Automatic Control and
Computer Science, Scientific Bulletin of Politehnica University of
Timisoara, Vol 49(63) nr. 2, 2004, pp. 209-215. ISSN 1224-600X.
-
Gyorodi, R., Gyorodi,
C., Bogan-Marta, A. and Pater, M., "Text mining and Web
mining", The 5th International Conference on Renewable
Sources and Environmental Electro-Technologies, Session Computer Science and
Control Systems, RSEE' 2004,
Analele Universităţii din Oradea, May 27-29, 2004, Stana de
Vale-Spa, Romania, pp. 14-18.
-
Gyorodi, R., Gyorodi,
C., Bogan-Marta, A. and Pater, M., "Bridging the gap between
OLAP and Data Mining", The 5th
International Conference on Renewable Sources and Environmental
Electro-Technologies, Session Computer Science and Control Systems, RSEE'
2004, Analele Universităţii din
Oradea, May 27-29, 2004, Stana de Vale-Spa, Romania, pp. 11-14.
-
Gyorodi, C., Gyorodi,
R., Bogan-Marta, A. and Pater, M., "The distributed algorithms in
mining association rules", ICCC 2004 International
Conference on Computers and Communications, May 27-29, 2004 Baile Felix
Spa-Oradea, Romania, First Edition, pp. 186-192.
-
Dojen, R. and Coffey, T.,
"Conditional Linear Cryptanalysis - Applying Linear Cryptanalysis to
Ciphers with Key-Dependant Operations". Invited paper at ISA'04, 4th
WSEAS International Conference on Information Science and Applications),
Miami, USA, 21-23 April 2004, Paper No. 484-266 (CD Proceedings only)
-
Newe T. and Coffey T., "On
the Logical Verification of Key Exchange Protocols for Mobile
Communications". Chapter in: Recent Advances in Communications
and Computer Science (WSEAS Press), pp 76-81, 2003. ISBN:960-8052-86-6.
-
Coffey, T., Dojen, R. and
Flanagan, T., "Formal Verification: An Imperative Step in the Design of
Security Protocols", Computer Networks Journal, Elsevier Science,
Volume 43, Number 5, 5 December 2003, pp.601-618.
-
Newe, T. and Coffey, T.,
"Minimum-Knowledge Schemes for low-power, low-memory Devices", Transactions
on Circuits and Systems, Issue 2, Volume 2, April 2003. pp 460-465. ISSN
1109-2734.
-
Newe, T. and Coffey, T.,
"Formal Verification logic for hybrid security protocols", International
Journal of Computer Systems Science & Engineering, Vol.18 no 1, Jan
2003, pp 17-25. ISSN 0267 619
-
Alesky, M. and Coffey, T.,
et.al (Editors), "Proceedings of International Symposium on
Information and Communication Technologies (ISICT03)" - A Volume in the
ACM International Conference Proceedings Series. 2003. ISBN 0-9544145-2-7.
-
Gyorodi, R., "A
comparative study of iterative algorithms in association rules mining", Studies
in Informatics and Control Journal, Volume 12 Number 3, September 2003,
ISSN 1220-1766, pag. 205-215.
-
Gyorodi, C. and Gyorodi,
R., "Association Rules Mining in Distributed Environments",
Annals of University of Craiova, Romania, Electrical
Engineering Series, No. 27, Vol .1 , 2003, pp. 126-133,
ISSN 1223-530X
-
Gyorodi, C. and Gyorodi,
R., "Frequent Patterns Discovery without Candidates Generation", RIA
Journal (revista Romana; de
Informatică şi Automatică), Volume 13, Number 4 ,
2003, pp. 76-88, ISSN 1220-1758.
-
Ventuneac, M., Coffey, T.,
Dragomiroiu, M. and Salomie, I., "A policy-based security framework for
virtual learning environments", Proceedings of 14th International
Conference on Control Systems and Computer Science. Bucharest, 2003,
ISBN: 973-8449-18-9.
-
Dragomiroiu, M., Ventuneac, M.,
Salomie, I. and Coffey, T., "On developing enterprise frameworks for
web-applications", Proceedings of 14th International Conference on
Control Systems and Computer Science, Bucharest, 2003. ISBN:
973-8449-18-9.
-
Dinsoreanu, M., Godja, C.,
Anghel, C., Salomie, I. and Coffey, T., "Mobile Agent based Solutions
for Knowledge Assessment in eLearning Environments", Proceedings of
EUROMEDIA'2003 Conference, Plymouth University, Plymouth, UK, 2003
-
Gyorodi , C., Gyorodi,
R. Coffey, T. and Holban, S., "Mining association rules using
dynamic FP-trees", Proceedings of Irish Signal and Systems
Conference, Limerick, 2003, ISBN 0 954 2973 1 8.
-
Dinsoreanu, M., Godja, C.,
Anghel, C., Salomie, I. and Coffey, T., "Mobile agent solutions for
student assessment in virtual learning environments", Proceedings of
IAWTIC 2003 Conference, Viena, Austria. 2003. ISBN 1740880692.
-
Gyorodi, C., Pater, M.
and Gyorodi, R., "Overview of Knowledge Discovery and Data Mining in
Databases", Proceedings of Arad, November 28-30, 2002, Arad,
Romania, pp. 67-73.
-
Dragomiroiu, M., Gyorodi,
R., Salomie, I. and Gyorodi, C., "Designing Reusable Web-Applicatio ns
by Employing Enterprise Frameworks", Computer and Information
Sciences - ISCIS 2003, 18th International Symposium, Antalya, Turkey,
November 3-5, 2003, Editura Springer Verlag, Berlin, pp. 1051-1060, ISSN
0302-9743, ISBN 3-540-20409-1.
-
Newe, T. and Coffey, T.,
"Minimum-Knowledge Schemes for low-power, low-memory Devices",
Invited Paper 3rd WSEAS Int. Conf. on Applied Informatics and
Communications (AIC'03), Rhodes Island, Greece, Nov 15-17, 2003. ISBN
960-8052-90-4.
-
Morrison, J. and Coffey, T.,
"Attacks and Counter Measures in Spread Spectrum Watermarking
Systems", Proceedings of IT&T Conference 2003, Letterkenny,
Ireland, Oct 2003, ISSN 1649-1246.
-
Coffey, T. and Dojen, R.,
"Analysis of a Mobile Communication Security Protocol", Proceedings
of ISICT'03 (Invited Workshop on Network Security and Management at the
International Symposium on Information and Communication Technologies), Dublin,
Ireland, 24-26 September 2003, pp.329-334, ISBN 0-9544145-2-7
-
Ventuneac, M., Coffey, T. and
Salomie, I., "A policy-based security framework for web-enabled
applications", Proceedings of International Symposium on Information
and Communication Technologies (ISICT03), Trinity College, Dublin, 2003,
pp. 505-510. ISBN 0-9544145-2-7.
-
Newe, T. and Coffey, T.,
"Security protocols for 2G and 3G wireless communications", Proceedings
of Symposium on Information and Communication Technologies (ISICT03),
Trinity College, Dublin, 2003, pp. 348-353. ISBN 0-9544145-2-7.
-
Coffey, T., Dojen, R. and
Flanagan, T., "On the Automated Implementation of Modal Logics used to
Verify Security Protocols", Proceedings of ISICT'03 (Invited
Workshop on Network Security and Management at the International Symposium
on Information and Communication Technologies), Dublin, Ireland, 24-26
September 2003, pp.322-328, ISBN 0-9544145-2-7
-
Coffey, T., Saidha, P. and
Burrows, P., "Analysing the security of a non-repudiation communication
protocol with mandatory proof of receipt", Proceedings of
International Symposium on Information and Communication Technologies
(ISICT03), Trinity College, Dublin, 2003, pp. 370-376. ISBN
0-9544145-2-7.
-
Coffey, T., Dojen, R. and
Flanagan, T., "On the Formal Verification of Cryptographic
Protocols", Proceedings of CSCC'03 (WSEAS International Conference
on Circuits, Systems, Communications and Computers), Corfu, Greece, 7-10
July 2003, Paper No. 457-355 (CD Proceedings only), ISBN 960-8052-82-3
-
Newe, T., Coffey, T., "On
the logical verification of key exchange protocols for mobile
communications", Proceedings of the WSEAS International Conference
on Communications (CSCC2003), Corfu, Greece, 2003, ISBN: 960 8052 82 3.
-
Gyorodi, R., "Mining
association rules in frequently updated databases", Proceedings
CSCS - 14 vol II, 14th International Conference on Control Systems and
Computer Science, Editura POLITEHNICA Press Bucharest, Romania, 2-5 July
2003, pp. 109-114. ISBN 973-8449-19-7
-
Coffey, T., Dojen, R. and
Flanagan, T., "On Different Approaches to Establish the Security of
Cryptographic Protocols", Proceedings of SAM'03 (Conference on
Security and Management), Vol. II, Las Vegas, USA, 23-26 June 2003,
Pages 637-643, ISBN 1-932415-18-1, Editor H.R. Arabnia and Y. Mun
-
Dragomiroiu, M., Ventuneac, M.,
Salomie, I. and Coffey, T., "Application framework development for
virtual learning environments", Proceedings of 25th Intl.
Conf. Information Technology Interfaces ITI2003, Cavtat, Croatia, June
2003.
-
Ventuneac, M., Coffey, T.,
Dragomiroiu, M. and Salomie, I., "Security policies for customizable
access control in virtual learning environments", Proceedings of
International Conference on Engineering of Modern Electrical Systems
(EMES03), Oradea - Felix Spa, Romania, 2003, ISSN - 1223-2106.
-
Dragomiroiu, M., Gyorodi,
R, Ventuneac, M, Salomie, I and Coffey, T, "Web-Applications, An
Enterprise Frameworks Based Approach", Proceedings of Engineering of
Modern Electrical Systems (EMES 2003), Computer Science Session, Oradea,
Romania, May 29-June 1, 2003.
-
Gyorodi, R., Gyorodi,
C. and Nagy, A., "A comparative study of association rules mining
algorithms with and without candidates generation", Proceedings
EMES'03, The 7'th Scientific conference with international
participation, session Computer Science and Control Systems, May 29-31,
2003, Oradea, Romania, pp. 51-57. ISSN 1223-2106.
-
Dragomiroiu, M., Gyorodi,
R., Ventuneac, M., Salomie, I. and Coffey, T., "Web-applications,
an enterprise frameworks-based approach", Proceedings of
International Conference on Engineering of Modern Electrical Systems
(EMES03), Oradea- Felix Spa, Romania, 2003, pp. 36-42. ISSN - 1223-2106
-
Dinsoreanu, M., Godja, C.,
Anghel, C., Salomie, I. and Coffey, T., "Mobile agent based solutions
for knowledge assessment in eLearning environments", Proceedings of
EUROMEDIA'2003 Conference, Plymouth University, UK, April 2003, ISSN
1649-1246.
-
Gyorodi, R., Holban, S., Coffey, T. and Gyorodi
C., "Identity confirmation system based on CTAG and HMM", Transactions
on Automatic Control and Computer Science, Scientific Bulletin of
Poliethnica University of Timisoara, Vol 47(61) No. 2, 2002, pp
35-41. ISSN 1224-600X.
-
Gyorodi, C., Gyorodi,
R. and Bogan-Marta, M., "Structured Knowledge Representation in Expert
Systems using MIKE", ALETHEIA Journal no. 13, Oradea,
Romania, Septembrie, 2002, pag. 481-489. ISBN 973-8032-25-3, ISSN 1221-4272,
-
Newe, T. and Coffey, T.,
"Hybrid Mobile Security Protocol: Formal verification using a new modal
logic", Proceedings of ICAI-2002, Puerto De La Cruz, Spain,
Dec.2002.
-
Gyorodi, C., Holban, S.,
Gyorodi, R. and Pater, M., " Mining Knowledge in Relational
Databases", CONTI'2002, 5th International
Conference on Technical Informatics, October 18-19th 2002,
Timisoara, Romania, Transactions on Automatic Control and Computer Science,
Scientific Bulletin of Politehnica University of Timisoara, Vol
47(61) nr. 2, 2002, pp. 1-6.
-
Gyorodi , R.,
Holban, S., Coffey, T. and Gyorodi,
C., "Identity confirmation system based on CTAG and HMM", Proceedings
of CONTI 2002 (5th International Conference on Technical
Informatics), October 2002, Timisoara, Romania
-
Gyorodi, C. and Gyorodi,
R., " D esigning and Validating New Curricula Employing Data Mining
Techniques", ECI'2002, 5th International Scientific
Conference on Electronic Computers and Informatics, October 10-11th
2002, Kosice - Herl'any, Slovakia, pp. 336-341.
-
Salomie, I., Dinsoreanu, M. and
Pusztai, K., "Designing Agent-Based Systems using UML and
Extensions", Proceedings of the 2nd Euorpean Conference on
Intelligent Systems and Technologies, Cavat, Croatia, July 17-20, 2002,
ISBN 973-8075-20-3
-
Gyorodi, C. and Gyorodi,
R., "Mining Association Rules in Large Databases", RSEE'
2002, The 4th International Conference on Renewable Sources and
Environmental Electro-Technologies, Automation and Computer Science,
June 6-8, 2002, Stana de Vale-Spa, Romania, pp. 115-122.
-
Gyorodi, R. and Gyorodi,
C., "Architectures of Data Mining Systems", RSEE' 2002, The
4th International Conference on Renewable Sources and
Environmental Electro-Technologies, Automation and Computer Science,
June 6-8, 2002, Stana de Vale-Spa, Romania, pp. 122-130.
-
Salomie, I., Dinsoreanu, M. and
Pusztai, K., "On the design of agent-based systems using UML and
extensions", Proceedings of the 24th IEEE International
Conference on Information Technology Interfaces, Cavat, Croatia, June
24-27, 2002, pp. 205-210.
-
Dadarlat,V., Coffey, T. and
Ivan, C., " A Personalized Approach for Teaching Web-based Curriculum
in Communications ans Computer Networks" IEEE CCECE02 Proceedings, Vol.
1 pp 732-737. May 2002, Manitoba, Canada.. ISBN 0-7803 7514 9.
-
Picovici, D., Mahdi, A.E. and
Coffey, T., "An Internet-based indoor air quality measurement
system", Proceedings of the 6th International Conference on
Development and Applications Systems, May 2002. Suceava, Romania, pp.
249-254. ISBN 973-98670-9-X
-
Dadarlat, V., Ivan, C. and
Coffey, T., "A Middleware Based Approach for Designing Routing
Protocols", IEEE CCEDCE02 Proceedings, Vol. 1, May 2002,
Manitoba, Canada, pp 1436 -1441. ISBN 0-7803 7514 9.
-
Morrison, J. and Coffey, T.,
"The Transition from GSM to the 3rd Generation: A Security
Perspective", Proceedings of Information Technology &
Telecommunications in the Institute of Technology and Industry Sectors
(e-generation 2001), Ireland, 2001. ISSN 16491246
-
Nedevschi, S., Salomie, I., s.a.,
"Retrieval of DICOM Ultrasound Images based on Structural Medical
Description", Proceedings of International Conference on Emerging
Telecommunications Technologies and Applications, ICETA 2001, 17-19
October 2001, Kosice, Slovakia, pp. 181 - 187;
-
Toal, D.J.F., Flanagan, C. and
Coffey, T., "Simulation in the Development of Mobile Robot Controllers,
Tread Warily." The 5th World Multi-Conference on Systemics,
Cybernetics and Informatics, SCI 2001, July, 2001, Orlando, Florida, USA
-
Flanagan, C., Toal, D., Leyden,
M. and Coffey, T., "Fuzzy Logic for Command Arbitration in Navigation
System for a Mobile Robot", Proceedings of 16th International
Conference on Production Research, 29 July 2001, Prague
-
Flanagan, T., Coffey, T. and
Dojen, R., "Radio Access Link Security for Universal Mobile
Telecommunication Systems (UMTS)", Proceedings of EMES 01 (Engineering
of Modern Electric Systems), Oradea-Felix Spa, Romania, 24-26 May, 2001.
Pages 18-23, ISSN 1223-2106.
-
Gyorodi, C. and Gyorodi,
R., "Knowledge Representation Using Object Oriented Programming -
Anomalies Introduced by Multiple Inheritance.", Proceedings of Oradea
EMES' 01, May 24-27, 2001, Oradea, Romania, pp. 219-227.
-
Dojen, R. and Coffey, T.,
"On the Cryptographic Strength of Symmetric Ciphers Suitable for
Power-Line Communications". Proceedings 2001 International Symposium
on Powerline Communications and its Applications, Malmo, Sweden, 04-06
April 2001, Pages 135-142, ISBN 91-7167-021-1.
-
Gyorodi, C., Gyorodi,
R. and Bogan-Marta, A., "Achiziţionarea cunoştinţelor in
sistemele expert.", ALETHEIA Journal no. 11, Oradea,
Romania, September, 2000, pp. 163-171.
-
Coffey T. and McGrath, S.,
(Editors) Proceedings of ISPLC2000 (2000 International Symposium on
Power-line Communications and its Applications), ISBN 1-87-4653-60-7.
-
Salomie I., Pusztai K.
and Nedevschi S. (editors), "Web based Educational Technology",
Casa Cartii de Stiinta Publ. House, Cluj-Napoca, Cluj-Napoca, Romania, 2000
-
Salomie, I., Hamza-Lup, F.,
Bot, R.S., Dinsoreanu, M. and Suciu, A. "Design Decisions of the
Virtual University in the Framework of Coned Tempus Project", in I.
Salomie, S.Nedevschi, K.Pusztai (editors) Web Based Educational Technology,
Casa Cartii de Stiinta Publ. House, Cluj-Napoca, 2000, p. 223 - 234
-
Salomie, I., Nedevschi S.,
Pusztai K., Goller, H. and Sintoma, B., "Java Mobile Agents for Student
Evaluation and Assessment in Virtual Universities", in I. Salomie,
S.Nedevschi, K.Pusztai (editors) Web Based Educational Technology, Casa
Cartii de Stiinta Publ. House, Cluj, 2000, p. 235 - 246
-
Salomie, I. and Nedevschi S.,
"Mobile Agents for e-Assessment in Virtual Universities", in
F.Restivo and L.Ribeiro (editors) Web Based Learning Environments, FEUP
Publ. House, Porto, 2000, pp. 161-163
-
Nedevschi S., Salomie I.,
Olinic D. and Leuca A., "Web Based Methodology for Education in the
Domain of Ultrasound Image Medical Description", in F.Restivo and
L.Ribeiro (editors) Web Based Learning Environments, FEUP Publ. House,
Porto, 2000, p. 151 - 153
-
Rarau, A., Salomie, I. and
Pusztai, K., "On Synchronization in a Mobile Environment", Eric
Horlait (ed) Mobile Agents for Telecommunication Applications., Lecture
Notes in Computer Science 1931, Springer 2000
-
Gyorodi, C., Gyorodi,
R. and Bogan-Marta, A., "A Method of Solving the Serializability of
Concurrent Transactions in the Database Systems.", ECI 2000
Electronic, Computers and Informatics, International Scientific Conference,
September 28-30th, 2000 Herľany,
SLOVAKIA, pp. 280-284.
-
Bogan-Marta, A., Gyorodi,
C. and Gyorodi, R., "Approaches of Problem Solving in Knowledge
Engineering Using MIKE.", RSEE' 2000,The 3'rd International
Conference on Renewable Sources and Environmental Electro-Technologies,
Automation and Computer Science, May 25-27, 2000, Felix-Spa, Romania,
pp. 158-164.
-
Bogan-Marta, A., Gyorodi,
C. and Gyorodi, R., "Knowledge Representation Using Frames-Anomalies
Inroduced by Multiple Inheritance." SINTES 10, International
Symposium on SystemTheory, Automation, Robotics, Computers, Informatics,
May 25-26. 2000, Craiova, Romania, Computers, pp. 46 - 49.
-
Gyorodi, C., Gyorodi,
R. and Bogan-Marta, A., "Techniques Used for Testing Serializability in
Concurrency Control of Transactions in the Database Systems." SINTES
10, International Symposium on SystemTheory, Automation, Robotics,
Computers, Informatics, May 25-26. 2000, Craiova, Romania, Computers,
pag. 113 - 114.
-
Gyorodi, C., Gyorodi,
R. and Bogan-Marta, A., "A Way to Approach the Deadlock in Da tabase
Systems.", RSEE' 2000,The 3'rd International Conference on
Renewable Sources and Environmental Electro-Technologies, Automation and
Computer Science, May 25-27, 2000, Felix-Spa, Romania, pag. 112-117.
-
Salomie I., Hamza-Lup, F., Bot,
R. and Dinsoreanu M., "Web based e-educational Environments using Java
Technology", Proc. of Internat. Conference OPTIM 2000, Brasov,
Romania, May 11-12, 2000, pp. 871-876
-
Salomie, I., Rarau, A. and
Pusztai, K., "Agent-Based Mobile Environment", Proceedings of
Agent-based Simulation Workshop, May 2000, Passau, Germany, pp. 221 -
226
-
Newe, T. and Coffey, T., "
Verifying a Minimum-Knowledge Authentication Protocol for use in Power-Line
Networks" Proceedings of ISPLC2000 (2000 International Symposium on
Power-line Communications 2000, Limerick, Ireland, April, pp 109-116.
ISBN 1-87-4653-60-7.
-
Gallagher, B., Moore, B. and
Coffey, T., "A Transport Protocol Independent Driver for a Power-Line
LAN", Proceedings of ISPLC2000 (2000 International Symposium on
Power-line Communications 2000, Limerick, Ireland, April, pp 233-240.
ISBN 1-87-4653-60-7.
-
Salomie, I., Goller, H.E.,
Sintoma, B. and Rarau, A., "Student Evaluation and Assessment in
Virtual Universities using Mobile Agents", Proceedings of
International Symposium on Tele-education and Telemedicine, ISTEP 2000,
Kosice, Slovakia, March 2000, pp. 245-250
-
Salomie I., Nedevschi, S.,
Hamza-Lup, F. and Bot, R., "Virtual University of Cluj - A Web based
Educational Framework", Proceedings of International Symposium on
Tele-education and Telemedicine, ISTEP 2000, Kosice, Slovakia, March
2000, p.251-256
-
Newe, T. and Coffey, T., "Formal
Testing & Algebraic Modelling Techniques for Verifying Cryptographic Protocols",
Proceedings of 7th EMES '99, Felix-Spa, Romania, May 27-29th, 1999.
-
Coffey, T. and Newe, T.,
"Realisation of a minimum-knowledge identification and signature
scheme", Computers and Security Journal, Vol 17, No.3, 1998, pp
253-264.
-
Coffey, T., Griffin, J., and
Moore, B., "A Media Access Control Protocol for a Power Line Local Area
Network", Invited Paper in: Proceedings of 1998 International
Symposium on Power Line Communications and Its Applications, pp179-193,
Soka University, Tokyo, Japan, 1998. ISBN 90-74249-18-3.
-
Coffey, T. and Saidha, P.,
"Logic for verifying public-key cryptographic protocols", IEE
Proc.- Computers and Digital Techniques, Vol.144, Issue 1, Jan 1997, pp
28-32.
-
Coffey, T and Frawley, M.,
"An expert advisor for networking low-level programmable industrial
devices", Proceedings of 30th ISATA Conference in Mechatronics,
Florence, Italy, June 1997.
-
Griffin, J., Moore, B. and
Coffey, T., "A method for operating a modem in a network and a modem
for use in the network", PCT Patent Application number PCT/IE/96/00066,
Patent No. S96 0709, Granted February 1997.
-
Gyorodi, R. and Gyorodi,
C., "Identity Confirmation System Based on the Features of the Human Face."
Analele Universităţii din Oradea, Fascicola Electrotehnică ,
Oradea, Romania, May 1997, pp. 29-34.
-
Coffey, T. and Saidha, P.,
"Non-Repudiation with Mandatory Proof of Receipt", ACM Computer
Communication Review, Vol. 26, No. 1, Jan 1996, pp 6-17.
ISSN:0146-4833
-
Coffey, T., "User
Authentication in a Global-Wide Network", European Consortium
for Mathematics in Industry, ECMI 93, pp 8-10, Montecatini Terme,
Italy; 1993.
-
Wang, W. and Coffey, T.,
"Network Security: Design of a Global Secure Link", ACM IFIP
Transactions: A ( Computer Science and Technology),
vA-15, 1992, p101-11.
-
Coffey, T. "Implementation
of Public Key and Secret Key Cryptography on a Local Area Network", Proceedings
of the Sixth European Conference on Mathematics in Industry, ECMI Vol. 8,
pp 115-120, B.G. Teubner, Stuttgart; 1992.
-
Treacy, D., Coffey, T. and
Owen-Jones, J., "A Review of the DES algorithm and the RSA algorithm
for Applications in Commercial Cryptography", Proceedings of
International Conference on Data Communications Technology Proceedings,
Ireland, 1988, p47-62, ISBN 0-9503-4275-0.
|