| Comparison-based computations over fully homomorphic encrypted data M Togan, C Pleşca 2014 10th international conference on communications (COMM), 1-6, 2014 | 49 | 2014 |
| A smart-phone based privacy-preserving security framework for IoT devices M Togan, BC Chifor, I Florea, G Gugulea 2017 9th International conference on electronics, computers and artificial …, 2017 | 31 | 2017 |
| DHCP server authentication using digital certificates DD Dinu, M Togan 2014 10th International Conference on Communications (COMM), 1-6, 2014 | 29 | 2014 |
| Privacy-preserving machine learning using federated learning and secure aggregation D Lia, M Togan 2020 12th International Conference on Electronics, Computers and Artificial …, 2020 | 23 | 2020 |
| Comparative study on feature selection methods rooted in swarm intelligence for intrusion detection AC Enache, V Sgârciu, M Togan 2017 21st international conference on control systems and computer science …, 2017 | 15 | 2017 |
| DHCPAuth—a DHCP message authentication module DD Dinu, M Togan 2015 IEEE 10th Jubilee International Symposium on Applied Computational …, 2015 | 12 | 2015 |
| Comparison-based applications for fully homomorphic encrypted data M Togan, L Morogan, C Plesca Proceedings of the Romanian Academy-Series A: Mathematics, Physics …, 2015 | 12 | 2015 |
| A generalized drm architectural framework VV Patriciu, I Bica, M Togan, SV Ghita Advances in Electrical and Computer Engineering 11 (1), 43-48, 2011 | 12 | 2011 |
| Design and implementation of cryptographic modules on FPGA M Togan, A Floarea, G Budariu Proceedings of the Applied Mathematics and Informatics, 149-154, 2010 | 12 | 2010 |
| A comprehensive and privacy-aware approach for remote qualified electronic signatures I Aciobăniței, ȘC Arseni, E Bureacă, M Togan Electronics 13 (4), 757, 2024 | 8 | 2024 |
| A modern paradigm for effective software development: Feature toggle systems CI Roşu, M Togan 2023 15th International Conference on Electronics, Computers and Artificial …, 2023 | 8 | 2023 |
| A flexible authorization mechanism for enterprise networks using smart-phone devices BC Chifor, S Teican, M Togan, G Gugulea 2018 International Conference on Communications (COMM), 437-440, 2018 | 8 | 2018 |
| A secure screen and app lock system for Android smart phones using face recognition R Stoleriu, M Togan 2020 13th International Conference on Communications (COMM), 133-138, 2020 | 7 | 2020 |
| Privacy preserving morphological operations for digital images C Lupaşcu, C Pleşca, M Togan 2020 13th International Conference on Communications (COMM), 183-188, 2020 | 6 | 2020 |
| Acceleration techniques for fully-homomorphic encryption schemes C Lupascu, M Togan, VV Patriciu 2019 22nd International Conference on Control Systems and Computer Science …, 2019 | 6 | 2019 |
| A FHE-based evaluation for searching on encrypted data M Togan 2016 International Conference on Communications (COMM), 291-296, 2016 | 6 | 2016 |
| An IP multicast-HTTP Gateway for reliable streaming in heterogeneous networks I Bica, SV Ghita, M Togan 2010 8th International Conference on Communications, 389-392, 2010 | 6 | 2010 |
| Secure speaker recognition system using homomorphic encryption MC Chindriş, M Togan, ŞC Arseni International Conference on Information Technology and Communications …, 2020 | 5 | 2020 |
| Methodologies for Retrieving and Processing Information from Open Sources (OSINT) CI JULAN, M TOGAN Journal of Military Technology Vol 6 (1), 2023 | 4 | 2023 |
| Instruction tracing and application profiling with qemu R Velea, M TOGAN MTA Review 27 (2), 2017 | 4 | 2017 |