Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-4 of 4 total results
Different Obfuscation Techniques for Code Protection ...
Procedia Computer Science 70 ( 2015 ) 757 – 763 Available online at www.sciencedirect.com 1877-0509 © 2015 The Authors. Published by Elsevier B.V.
Applied Computer Science and Cyber Security Team - www.acs ...
Assoc. Prof. Catalin BOJA Ph.D. is a member of Department of Economic Informatics and Cybernetics / Computer Science Department, Faculty of C.S.I.E/C.S.E.I, @ The Bucharest University of Economic Studies, Romania.Starting with October 2011, he is the Head of the D.I.C.E / D.E.I.C, and in April 2008 he has received, from the Academy of Economic Studies of Bucharest, his Ph.D. diploma in the ...
www.acs.ase.ro/acs-team
Average Rating (0 votes)
About the Conference | The 19th International Conference ...
The International Conference on INFORMATICS in ECONOMY (IE), Education, Research & Business Technologies, is held every year since 1993 in Bucharest, Romania.The Conference promotes research results in Business Informatics and related Computer Science topics: Cloud, Distributed and Parallel Computing, Mobile-Embedded and Multimedia Solutions, E-Society, Enterprise and Business Solutions ...
Legal and Practical Aspects in the Computer Science ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 2, 2011 ISSN 2067 – 4074 In order to be able to demonstrate in front of the court the fact that the data present on the investigated storing device are identical to the ones in the image created by EnCase, a hash of these can be carried out in order for the results to be compared.