Fingerprints identification using a fuzzy logic system I Iancu, N Constantinescu, M Colhon International Journal of Computers Communications & Control 5 (4), 525-531, 2010 | 38 | 2010 |

Intuitionistic fuzzy system for fingerprints authentication I Iancu, N Constantinescu Applied Soft Computing 13 (4), 2136-2142, 2013 | 27 | 2013 |

Classifcation and comparison of information structures from a web page M Cosulschi, N Constantinescu, M Gabroveanu Annals of the University of Craiova-Mathematics and Computer Science Series 31, 2004 | 18 | 2004 |

Nonlinearities in elliptic curve authentication R Alsaedi, N Constantinescu, V Rădulescu Entropy 16 (9), 5144-5158, 2014 | 11 | 2014 |

Complexity computations in code cracking problems E Simion, NS Constantinescu 24th International Spring Seminar on Electronics Technology. Concurrent …, 2001 | 9 | 2001 |

Authentication protocol based on ellipitc curve cryptography N Constantinescu Annals of the University of Craiova-Mathematics and Computer Science Series …, 2010 | 8 | 2010 |

Towards using grid services for mining fuzzy association rules M Gabroveanu, I Iancu, M Cosulschi, N Constantinescu Ninth International Symposium on Symbolic and Numeric Algorithms for …, 2007 | 8 | 2007 |

Authentication ranks with identities based on elliptic curves N Constantinescu Annals of the University of Craiova-Mathematics and Computer Science Series …, 2007 | 8 | 2007 |

HTML Pattern Generator--Automatic Data Extraction from Web Pages M Cosulschi, A Giurca, B Udrescu, N Constantinescu, M Gabroveanu 2006 Eighth International Symposium on Symbolic and Numeric Algorithms for …, 2006 | 7 | 2006 |

Intelligent data retrieval with hierarchically structured information O Ţicleanu, N Constantinescu, D Ebāncă Intelligent Interactive Multimedia Systems and Services, 345-351, 2013 | 6 | 2013 |

Security system vulnerabilities N Constantinescu Proceedings of the Romanian Academy Series A-Mathematics Physics Technical …, 2012 | 6 | 2012 |

Estimators in cryptography N Constantinescu arXiv preprint arXiv:1202.5921, 2012 | 5 | 2012 |

Authentication model based on Multi-Agent System N Constantinescu, CI Popirlan Annals of the University of Craiova-Mathematics and Computer Science Series …, 2011 | 5 | 2011 |

Elliptic curve cryptosystems and scalar multiplication N Constantinescu Annals of the University of Craiova-Mathematics and Computer Science Series …, 2010 | 5 | 2010 |

RSA-Padding Signatures with Attack Studies G Stephanides, N Constantinescu, M Cosulschi, M Gabroveanu International Conference on Web Information Systems and Technologies 2, 97-100, 2006 | 5 | 2006 |

The GN-authenticated key agreement N Constantinescu, G Stephanides Journal of Applied Mathematics and Computation 170 (1), 531-544, 2006 | 5 | 2006 |

The GN-authenticated key agreement G Stephanides, N Constantinescu Applied mathematics and computation 170 (1), 531-544, 2005 | 5 | 2005 |

A new approach to mining fuzzy association rules from distributed databases M Gabroveanu, M Cosulschi, N Constantinescu Annals of the University of Bucharest, Mathematics and Computer Science …, 2005 | 5 | 2005 |

Identification of parts in identity-based encryption, Research Notes in Data Security, Wessex Institute of Technology, UK, developed with University of Bergen, Norway N Constantinescu, G Stephanides | 5 | 2004 |

Usage of advanced data structure for improving efficiency for large (n, m) permutations inspired from the Josephus problem M Cosulschi, M Gabroveanu, N Constantinescu SCIENCE AND TECHNOLOGY 12 (1), 13-24, 2009 | 4 | 2009 |