default search action
Sead Muftic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 1989
- [b1]Sead Muftic:
Security mechanisms for computer networks. Ellis Horwood series in computers and their applications, Ellis Horwood 1989, ISBN 978-0-13-799180-8, pp. 1-195
Journal Articles
- 2016
- [j13]Sead Muftic, Nazri bin Abdullah, Ioannis Kounelis:
Business Information Exchange System with Security, Privacy, and Anonymity. J. Electr. Comput. Eng. 2016: 7093642:1-7093642:10 (2016) - [j12]Sead Muftic:
BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger. Ledger 1: 19-37 (2016) - 2015
- [j11]Muhammad Awais Shibli, Rahat Masood, Yumna Ghazi, Sead Muftic:
MagicNET: mobile agents data protection system. Trans. Emerg. Telecommun. Technol. 26(5): 813-835 (2015) - 1995
- [j10]Nada Kapidzic, Sead Muftic:
COST-PEM certificates verification: An alternative procedure. Comput. Networks ISDN Syst. 26(Supplement-4): S187-S191 (1995) - 1994
- [j9]Sead Muftic:
Security Architecture for ODP Systems. Comput. Networks ISDN Syst. 26(11): 1343-1349 (1994) - [j8]Sead Muftic:
Editorial. Comput. Commun. 17(7): 451-452 (1994) - [j7]Sead Muftic, Morris Sloman:
Security architecture for distributed systems. Comput. Commun. 17(7): 492-500 (1994) - 1992
- [j6]Sead Muftic:
Implementation of the Comprehensive Integrated Security System for Computer Networks. Comput. Networks ISDN Syst. 25(4-5): 469-475 (1992) - [j5]Sead Muftic, Edina Hatunic:
CISS: Generalized security libraries. Comput. Secur. 11(7): 653-659 (1992) - 1990
- [j4]Sead Muftic:
Transaction protection by "antennas". Comput. Secur. 9(3): 245-255 (1990) - 1989
- [j3]Sead Muftic:
Extended OSI Security Architecture. Comput. Networks 17: 223-227 (1989) - 1988
- [j2]Sead Muftic:
Security Mechanisms for Computer Networks. Comput. Networks 15: 67-71 (1988) - 1986
- [j1]Sead Muftic:
Secury Mechanisms for Computer Networks (A Program of the CEC COST-11 Ter Project). Comput. Networks 12: 339-344 (1986)
Conference and Workshop Papers
- 2014
- [c26]Ioannis Kounelis, Sead Muftic, Jan Löschner:
Secure and privacy-enhanced e-mail system based on the concept of proxies. MIPRO 2014: 1405-1410 - 2013
- [c25]Ioannis Kounelis, Gianmarco Baldini, Sead Muftic, Jan Löschner:
An Architecture for Secure m-Commerce Applications. CSCS 2013: 519-525 - 2012
- [c24]Feng Zhang, Aron Kondoro, Sead Muftic:
Location-Based Authentication and Authorization Using Smart Phones. TrustCom 2012: 1285-1292 - 2011
- [c23]Ioannis Kounelis, Hao Zhao, Sead Muftic:
Secure Middleware for Mobile Phones and UICC Applications. MOBILWARE 2011: 143-152 - [c22]Guy C. Hembroff, Xinli Wang, Sead Muftic:
Providing an Additional Factor for Patient Identification Based on Digital Fingerprint. HealthSec 2011 - [c21]Hao Zhao, Sead Muftic:
The concept of Secure Mobile Wallet. WorldCIS 2011: 54-58 - [c20]Abdul Ghafoor Abbasi, Sead Muftic, Shahzad Mumtaz:
Security extensions of Windows environment based on FIPS 201 (PIV) smart card. WorldCIS 2011: 86-92 - [c19]Feng Zhang, Sead Muftic, Gernot Schmoelzer:
Secure service-oriented architecture for mobile transactions. WorldCIS 2011: 133-138 - 2010
- [c18]Muhammad Awais Shibli, Imran Yousaf, Sead Muftic:
MagicNET: Security System for Protection of Mobile Agents. AINA 2010: 1233-1240 - [c17]Guy C. Hembroff, Sead Muftic:
SAMSON: Secure access for medical smart cards over networks. WOWMOM 2010: 1-6 - 2009
- [c16]Abdul Ghafoor Abbasi, Sead Muftic, Gernot Schmölzer:
CryptoNET: Secure federation protocol and authorization policies for SMI. CRiSIS 2009: 19-25 - [c15]Abdul Ghafoor Abbasi, Sead Muftic, Gernot Schmölzer:
A model and design of a security provider for Java applications. ICITST 2009: 1-7 - [c14]Alessandro Giambruno, Muhammad Awais Shibli, Sead Muftic, Antonio Lioy:
MagicNET: XACML authorization policies for mobile agents. ICITST 2009: 1-7 - [c13]Muhammad Awais Shibli, Sead Muftic, Alessandro Giambruno, Antonio Lioy:
MagicNET: Security System for Development, Validation and Adoption of Mobile Agents. NSS 2009: 389-396 - [c12]Guy C. Hembroff, Sead Muftic:
Secure healthcare information exchange for local domains. PervasiveHealth 2009: 1-7 - 2008
- [c11]Chih-Chun Chang, Sead Muftic, David J. Nagel:
Security in Operational Wireless Sensor Networks. CCNC 2008: 781-785 - [c10]Sead Muftic, Gernot Schmoelzer:
Cryptonet: Secure E-Mail System. SECRYPT 2008: 84-91 - [c9]Muhammad Awais Shibli, Sead Muftic:
Intrusion Detection and Prevention System using Secure Mobile Agents. SECRYPT 2008: 107-113 - 2007
- [c8]Chih-Chun Chang, Sead Muftic, David J. Nagel:
Measurement of Energy Costs of Security in Wireless Sensor Nodes. ICCCN 2007: 95-102 - [c7]Chih-Chun Chang, Shadi Arafa, Sead Muftic:
Key Establishment Protocol for Wireless Sensor Networks. MASS 2007: 1-6 - [c6]Chih-Chun Chang, David J. Nagel, Sead Muftic:
Assessment of Energy Consumption in Wireless Sensor Networks: A Case Study for Security Algorithms. MASS 2007: 1-6 - [c5]Chih-Chun Chang, David J. Nagel, Sead Muftic:
Balancing Security and Energy Consumption in Wireless Sensor Networks. MSN 2007: 469-480 - [c4]Mohammad Alhammouri, Sead Muftic:
Management of Groups and Group Keys in Multi-level Security Environments. SAFECOMP 2007: 75-80 - 2003
- [c3]Matei Ciobanu Morogan, Sead Muftic:
Certificate Management in Ad Hoc Networks. SAINT Workshops 2003: 337-341 - 2002
- [c2]Kasun De Zoysa, Sead Muftic:
Bi-directional Web Document Protection System for Serious E-commerce Applications. ICPP Workshops 2002: 11-16 - 1999
- [c1]Ioannis Mavridis, George Pangalos, Triadafyllos Koukouvinos, Sead Muftic:
A Secure Payment System for Electronic Commerce. DEXA Workshop 1999: 832-836
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint