Algoritmi | User | André Ventura da Cruz Marnôto Zúquete


André Ventura da Cruz Marnôto Zúquete

André Ventura da Cruz Marnôto Zúquete
Personal Email
Orcid
0000-0002-9745-4361Researcher ID
FCT Public Key
Ciência ID
6618-2113-6A6FGoogle Scholar
Publications (114)
Enhancing 802.1X authentication with identity providers using EAP-OAUTH and OAuth 2.0
Computer Networks
2024 | journal-article
A federated authentication schema among multiple identity providers
Heliyon
2024 | journal-article
Adaptive, Multi-Factor Authentication as a Service for Web Applications
2023 | conference-paper
VPN User Authentication Using Centralized Identity Providers
ICNS 2023 : The Nineteenth International Conference on Networking and Services
2023 | conference-paper
VPN User Authentication Using Centralized Identity Providers
The Nineteenth International Conference on Networking and Services (ICNS 2023)
2023 | conference-paper
The state of the art of the electronic bill of lading [version 1; peer review: 1 approved with reservations]
2022 | journal-article
A Fair Channel Hopping Scheme for LoRa Networks with Multiple Single-Channel Gateways
Sensors
2022 | journal-article
Secure Browsing in Local Government: The Case of Portugal
Journal of Web Engineering
2021 | journal-article
A Pseudonymisation Protocol With Implicit and Explicit Consent Routes for Health Records in Federated Ledgers
IEEE Journal of Biomedical and Health Informatics
2021 | journal-article
Security and privacy of the Internet of Things
Computers & Security
2021 | journal-article
Segurança em Redes Informáticas (6ª Edição Atualizada e Aumentada)
FCA
2021 | book
Trading hardware with medium reservation to tackle scalability in low-cost, single-channel LoRa networks
2021 | journal-article
EAP-SH: An EAP Authentication Protocol to Integrate Captive Portals in the 802.1X Security Architecture
Wireless Personal Communications
2020 | journal-article
An Efficient and Secure Alert System for VANETs to Improve Crosswalks’ Security in Smart Cities
Sensors
2020 | journal-article
A parser to support the definition of access control policies and rules using natural languages
2020 | journal-article
Complementing vehicular connectivity coverage through cellular networks
2020 | conference-paper
Evolution of HTTPS Usage by Portuguese Municipalities
2020 | journal-article
QoE of Video Streaming in Multihomed Vehicular Networks
Proceedings of the 4th Internet-QoE Workshop on QoE-based Analysis and Management of Data Communication Networks - Internet-QoE'19
2019 | conference-paper
Security-Oriented Architecture for Managing IoT Deployments
Symmetry
2019 | journal-article
Integration of the Captive Portal paradigm with the 802.1X architecture
2019 | preprint
Smart Crosswalks: A Safe Alert System That Minimizes The Confrontation Between Vehicles and Pedestrians
Proceedings of the International Conferences ICT, Society, and Human Beings 2019; Connected Smart Cities 2019; and Web Based Communities and Social Media 2019
2019 | conference-paper
The impact of ECDSA in a VANET routing service: Insights from real data traces
Ad Hoc Networks
2019 | journal-article
An Architecture to Support the Invocation of Personal Services in Web Interactions
2019 | preprint
Preface
IFIP Advances in Information and Communication Technology
2019 | book
Survey of Passengers’ Origin-Destination in Public Transportation Networks Using Wi-Fi
Communications in Computer and Information Science
2019 | book-chapter
Usage of HTTPS by municipal websites in Portugal
Advances in Intelligent Systems and Computing
2019 | book
Using reputation as a coin to bet on information items distributed in a smart city
2019 5th International Conference on Mobile and Secure Services, MOBISECSERV 2019
2019 | conference-paper
Federation of Attribute Providers for User Self-Sovereign Identity
Journal of Information Systems Engineering & Management
2018 | journal-article
TROPHY: Trustworthy VANET routing with group authentication keys
Ad Hoc Networks
2018 | journal-article
A propose for a federated ledger for regulated self-sovereignty
Iberian Conference on Information Systems and Technologies, CISTI
2018 | conference-paper
A trace-based emulator for vehicular ad hoc networks
SIMULTECH 2018 - Proceedings of 8th International Conference on Simulation and Modeling Methodologies, Technologies and Applications
2018 | conference-paper
Fast, scalable and secure over-the-air bootstrap of Linux operating systems with Wi-Fi ad hoc networks
Wireless Networks
2018 | journal-article
Multi-technology vs Single-technology Architecture for Network Coding in VANETs
Proceedings - IEEE Symposium on Computers and Communications
2018 | conference-paper
Segurança em Redes Informáticas (5ª Edição Atualizada)
FCA - Editora de Informática
2018 | book
Survey of Public Transport Routes using Wi-Fi
VEHITS 2018 - Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems
2018 | conference-paper
Vehicle-to-vehicle real-time video transmission through IEEE 802.11p for assisted-driving
IEEE Vehicular Technology Conference
2018 | conference-paper
Exploitation of dual channel transmissions to increase security and reliability in classic bluetooth piconets
Q2SWinet 2016 - Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks, co-located with MSWiM 2016
2016 | conference-paper
Privacy policies and practices in Portuguese local e-government
Electronic Government
2016 | journal-article
Traffic classification for managing Applications’ networking profiles
Security and Communication Networks
2016 | journal-article
Virtual Machine Halt
Proceedings of the ACM Symposium on Applied Computing
2016 | conference-paper
Towards dynamic adaptation in broadcasting with hybrid rateless codes
ACM SIGBED Review
2015 | journal-article
Secure and trustworthy file sharing over cloud storage using eID tokens
2015 | preprint
Application-specific traffic anomaly detection using universal background model
IWSPA 2015 - Proceedings of the 2015 ACM International Workshop on Security and Privacy Analytics, Co-located with CODASPY 2015
2015 | conference-paper
Authenticated file broadcast protocol
IFIP Advances in Information and Communication Technology
2015 | book
Orchestrating feedback for hybrid rateless codes
Proceedings of 21st European Wireless Conference, European Wireless 2015
2015 | conference-paper
Traffic classification and verification using unsupervised learning of Gaussian Mixture Models
2015 IEEE International Workshop on Measurements and Networking, M and N 2015 - Proceedings
2015 | conference-paper
Communications and Multimedia Security
Lecture Notes in Computer Science
2014 | book
DETIboot: a fast, wireless system to install operating systems on students laptops
2014 | conference-paper
Decentralized bootstrap for social overlay networks
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | book
Fast image file distribution with Fountain codes via a Wi-Fi ad-hoc network, using low power processors
2014 16th International Telecommunications Network Strategy and Planning Symposium, Networks 2014
2014 | conference-paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | book
Massively parallel identification of Privacy-Preserving vehicle rfid tags
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | book
Personal identification in the web using electronic identity cards and a personal identity provider
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | book
Self-adapted protocol for intra and inter-echelons communications
2014 16th International Telecommunications Network Strategy and Planning Symposium, Networks 2014
2014 | conference-paper
PROCESSO DE AGREGAÇÃO DE ATRIBUTOS DE UM UTENTE COM GARANTIA DE PRIVACIDADE
2013 | patent
A dependable alternative to the spanning tree protocol
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | book
Agent-based interoperability for e-government
Advances in Intelligent Systems and Computing
2013 | book
Analysis of hybrid relaying in cooperative WLAN
IFIP Wireless Days
2013 | conference-paper
Biometric authentication using electroencephalograms: a practical study using visual evoked potentials
2013 | journal-article
Privacy policies in web sites of portuguese municipalities: An empirical study
Advances in Intelligent Systems and Computing
2013 | book
Segurança em Redes Informáticas (4ª Edição Atualizada)
FCA - Editora de Informática
2013 | book
User-centric, private networks of services
2013 International Conference on Smart Communications in Network Technologies, SaCoNeT 2013
2013 | conference-paper
Wireless Cooperative Relaying Based On Opportunistic Relay Selection
International Journalon Advances in Networks and Services
2012 | journal-article
A framework for enforcing user-based authorization policies on packet filter firewalls
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | book
A negative selection approach to intrusion detection
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | book
A new location layer for the TCP/IP protocol stack
Computer Communication Review
2012 | conference-paper
Citizen-side handling of life event services
WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies
2012 | conference-paper
Identification of source applications for enhanced traffic analysis and anomaly detection
IEEE International Conference on Communications
2012 | conference-paper
Modeling pause time in social mobility models
Proceedings of the International Symposium on Wireless Communication Systems
2012 | conference-paper
Opportunistic relay selection for wireless cooperative network
2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops
2012 | conference-paper
Security model for the dynamic composition of workflows in e-government architectures,Modelo de segurança para a composição dinâmica de workflows em arquiteturas de e-government
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao
2012 | journal-article
A general interoperability architecture for e-government based on agents and web services
Proceedings of the 6th Iberian Conference on Information Systems and Technologies, CISTI 2011
2011 | conference-paper
Biometric authentication with electroencephalograms: Evaluation of its suitability using visual evoked potentials
Communications in Computer and Information Science
2011 | book
Citizen controlled exchange of information in e-government
WEBIST 2011 - Proceedings of the 7th International Conference on Web Information Systems and Technologies
2011 | conference-paper
Fast 802.11 handovers with 802.1X reauthentications
Security and Communication Networks
2011 | journal-article
Improving mobile networks based on social mobility modeling
Proceedings - International Conference on Network Protocols, ICNP
2011 | conference-paper
Interference-aware opportunistic relay selection
Proceedings of the ACM CoNEXT Student Workshop, CoNEXT 2011
2011 | conference-paper
Packet tagging system for enhanced traffic profiling
2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, IMSAA 2011 - Conference Proceedings
2011 | conference-paper
Pre-allocation of DHCP leases: A cross-layer approach
2011 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011 - Proceedings
2011 | conference-paper
RFID technology applied to students' backpacks
2011 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2011
2011 | conference-paper
Social networking for anonymous communication systems: A survey
Proceedings of the 2011 International Conference on Computational Aspects of Social Networks, CASoN'11
2011 | conference-paper
A 3GPP open-ID framework
2010 Future Network and Mobile Summit
2010 | conference-paper
Biometric authentication using brain responses to visual stimuli
BIOSIGNALS 2010 - Proceedings of the 3rd International Conference on Bio-inpsired Systems and Signal Processing, Proceedings
2010 | conference-paper
Fast VPN mobility across Wi-Fi hotspots
2010 2nd International Workshop on Security and Communication Networks, IWSCN 2010
2010 | conference-paper
Segurança em Redes Informáticas (3ª Edição Atualizada e Aumentada)
FCA - Editora de Informática
2010 | book
A security framework for cognitive radio IP based cooperative protocols
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
2009 | conference-paper
An overview of security ontologies
2009 | conference-paper
Protection of LAN-wide, P2P interactions: A holistic approach
International Journal of Communication Networks and Distributed Systems
2009 | journal-article
Security concerns in eGovernment agent-based interoperability
2009 | conference-paper
Authentication architecture for region-wide e-Health system with smartcards and a PKI
Communications in Computer and Information Science
2008 | book
Authentication of professionals in the RTS E-health system
HEALTHINF 2008 - 1st International Conference on Health Informatics, Proceedings
2008 | conference-paper
Enhanced secure interface for a portable e-voting terminal
SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings
2008 | conference-paper
Fast, secure handovers in 802.11: Back to the basis
Q2SWinet'08: Proceedings of the 4th ACM International Symposium on QoS and Security for Wireless and Mobile Networks
2008 | conference-paper
IS 2008 PC co-chairs' message
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008 | book
Improved CSMA/CA protocol for IEEE 802.11
4th EURO-NGI Conference on Next Generation Internet Networks - Proceedings
2008 | conference-paper
Physical-layer encryption with stream ciphers
IEEE International Symposium on Information Theory - Proceedings
2008 | conference-paper
Verifiable anonymous vote submission
Proceedings of the ACM Symposium on Applied Computing
2008 | conference-paper
Voto Electrónico - Discussão Técnica dos Seus Problemas e Oportunidades
Voto Electrónico - Discussão Técnica dos Seus Problemas e Oportunidades
2008 | book
Authentication architecture for eHealth professionals
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007 | book
A security architecture for protecting LAN interactions
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006 | book
An electronic voting system supporting vote weights
Internet Research
2006 | journal-article
An efficient high quality random number generator for multi-programmed systems
Journal of Computer Security
2005 | journal-article
Aplicação de HelpDesk baseada em PDAs, para apoio à manutenção do Parque Informático da Universidade de Aveiro
2005 | journal-article
StackFences: a run-time approach for detecting stack overflows
2004 | journal-article
REVS - A Robust Electronic Voting System
WWW / Internet
2003 | journal-article
Improving the Functionality of SYN Cookies
Advanced Communications and Multimedia Security
2002 | other
Segurança em comunicações remotas de aplicações legadas
Universidade de Lisboa Instituto Superior Técnico
2001 | dissertation-thesis
SPL: An access control language for security policies with complex constraints
Network and Distributed System Security Symposium
2001 | conference-paper
Enforcing obligation with security monitors
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2001 | book
Security Policy Consistency
2000 | preprint
Efficient error-propagating block chaining
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
1997 | book
Transparent authentication and confidentiality for stream sockets
IEEE Micro
1996 | journal-article
Orthogonal persistence in a heterogeneous distributed object-oriented environment
Computer Journal
1994 | journal-article
Distribution and persistence in the IK platform: Overview and evaluation
Computing systems
1993 | journal-article
Enhancing 802.1X authentication with identity providers using EAP-OAUTH and OAuth 2.0
Computer Networks
2024 | journal-article
A federated authentication schema among multiple identity providers
Heliyon
2024 | journal-article
Adaptive, Multi-Factor Authentication as a Service for Web Applications
2023 | conference-paper
VPN User Authentication Using Centralized Identity Providers
ICNS 2023 : The Nineteenth International Conference on Networking and Services
2023 | conference-paper
VPN User Authentication Using Centralized Identity Providers
The Nineteenth International Conference on Networking and Services (ICNS 2023)
2023 | conference-paper
The state of the art of the electronic bill of lading [version 1; peer review: 1 approved with reservations]
2022 | journal-article
A Fair Channel Hopping Scheme for LoRa Networks with Multiple Single-Channel Gateways
Sensors
2022 | journal-article
Secure Browsing in Local Government: The Case of Portugal
Journal of Web Engineering
2021 | journal-article
A Pseudonymisation Protocol With Implicit and Explicit Consent Routes for Health Records in Federated Ledgers
IEEE Journal of Biomedical and Health Informatics
2021 | journal-article
Security and privacy of the Internet of Things
Computers & Security
2021 | journal-article
Segurança em Redes Informáticas (6ª Edição Atualizada e Aumentada)
FCA
2021 | book
Trading hardware with medium reservation to tackle scalability in low-cost, single-channel LoRa networks
2021 | journal-article
EAP-SH: An EAP Authentication Protocol to Integrate Captive Portals in the 802.1X Security Architecture
Wireless Personal Communications
2020 | journal-article
An Efficient and Secure Alert System for VANETs to Improve Crosswalks’ Security in Smart Cities
Sensors
2020 | journal-article
A parser to support the definition of access control policies and rules using natural languages
2020 | journal-article
Complementing vehicular connectivity coverage through cellular networks
2020 | conference-paper
Evolution of HTTPS Usage by Portuguese Municipalities
2020 | journal-article
QoE of Video Streaming in Multihomed Vehicular Networks
Proceedings of the 4th Internet-QoE Workshop on QoE-based Analysis and Management of Data Communication Networks - Internet-QoE'19
2019 | conference-paper
Security-Oriented Architecture for Managing IoT Deployments
Symmetry
2019 | journal-article
Integration of the Captive Portal paradigm with the 802.1X architecture
2019 | preprint
Smart Crosswalks: A Safe Alert System That Minimizes The Confrontation Between Vehicles and Pedestrians
Proceedings of the International Conferences ICT, Society, and Human Beings 2019; Connected Smart Cities 2019; and Web Based Communities and Social Media 2019
2019 | conference-paper
The impact of ECDSA in a VANET routing service: Insights from real data traces
Ad Hoc Networks
2019 | journal-article
An Architecture to Support the Invocation of Personal Services in Web Interactions
2019 | preprint
Preface
IFIP Advances in Information and Communication Technology
2019 | book
Survey of Passengers’ Origin-Destination in Public Transportation Networks Using Wi-Fi
Communications in Computer and Information Science
2019 | book-chapter
Usage of HTTPS by municipal websites in Portugal
Advances in Intelligent Systems and Computing
2019 | book
Using reputation as a coin to bet on information items distributed in a smart city
2019 5th International Conference on Mobile and Secure Services, MOBISECSERV 2019
2019 | conference-paper
Federation of Attribute Providers for User Self-Sovereign Identity
Journal of Information Systems Engineering & Management
2018 | journal-article
TROPHY: Trustworthy VANET routing with group authentication keys
Ad Hoc Networks
2018 | journal-article
A propose for a federated ledger for regulated self-sovereignty
Iberian Conference on Information Systems and Technologies, CISTI
2018 | conference-paper
A trace-based emulator for vehicular ad hoc networks
SIMULTECH 2018 - Proceedings of 8th International Conference on Simulation and Modeling Methodologies, Technologies and Applications
2018 | conference-paper
Fast, scalable and secure over-the-air bootstrap of Linux operating systems with Wi-Fi ad hoc networks
Wireless Networks
2018 | journal-article
Multi-technology vs Single-technology Architecture for Network Coding in VANETs
Proceedings - IEEE Symposium on Computers and Communications
2018 | conference-paper
Segurança em Redes Informáticas (5ª Edição Atualizada)
FCA - Editora de Informática
2018 | book
Survey of Public Transport Routes using Wi-Fi
VEHITS 2018 - Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems
2018 | conference-paper
Vehicle-to-vehicle real-time video transmission through IEEE 802.11p for assisted-driving
IEEE Vehicular Technology Conference
2018 | conference-paper
Exploitation of dual channel transmissions to increase security and reliability in classic bluetooth piconets
Q2SWinet 2016 - Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks, co-located with MSWiM 2016
2016 | conference-paper
Privacy policies and practices in Portuguese local e-government
Electronic Government
2016 | journal-article
Traffic classification for managing Applications’ networking profiles
Security and Communication Networks
2016 | journal-article
Virtual Machine Halt
Proceedings of the ACM Symposium on Applied Computing
2016 | conference-paper
Towards dynamic adaptation in broadcasting with hybrid rateless codes
ACM SIGBED Review
2015 | journal-article
Secure and trustworthy file sharing over cloud storage using eID tokens
2015 | preprint
Application-specific traffic anomaly detection using universal background model
IWSPA 2015 - Proceedings of the 2015 ACM International Workshop on Security and Privacy Analytics, Co-located with CODASPY 2015
2015 | conference-paper
Authenticated file broadcast protocol
IFIP Advances in Information and Communication Technology
2015 | book
Orchestrating feedback for hybrid rateless codes
Proceedings of 21st European Wireless Conference, European Wireless 2015
2015 | conference-paper
Traffic classification and verification using unsupervised learning of Gaussian Mixture Models
2015 IEEE International Workshop on Measurements and Networking, M and N 2015 - Proceedings
2015 | conference-paper
Communications and Multimedia Security
Lecture Notes in Computer Science
2014 | book
DETIboot: a fast, wireless system to install operating systems on students laptops
2014 | conference-paper
Decentralized bootstrap for social overlay networks
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | book
Fast image file distribution with Fountain codes via a Wi-Fi ad-hoc network, using low power processors
2014 16th International Telecommunications Network Strategy and Planning Symposium, Networks 2014
2014 | conference-paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | book
Massively parallel identification of Privacy-Preserving vehicle rfid tags
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | book
Personal identification in the web using electronic identity cards and a personal identity provider
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | book
Self-adapted protocol for intra and inter-echelons communications
2014 16th International Telecommunications Network Strategy and Planning Symposium, Networks 2014
2014 | conference-paper
PROCESSO DE AGREGAÇÃO DE ATRIBUTOS DE UM UTENTE COM GARANTIA DE PRIVACIDADE
2013 | patent
A dependable alternative to the spanning tree protocol
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | book
Agent-based interoperability for e-government
Advances in Intelligent Systems and Computing
2013 | book
Analysis of hybrid relaying in cooperative WLAN
IFIP Wireless Days
2013 | conference-paper
Biometric authentication using electroencephalograms: a practical study using visual evoked potentials
2013 | journal-article
Privacy policies in web sites of portuguese municipalities: An empirical study
Advances in Intelligent Systems and Computing
2013 | book
Segurança em Redes Informáticas (4ª Edição Atualizada)
FCA - Editora de Informática
2013 | book
User-centric, private networks of services
2013 International Conference on Smart Communications in Network Technologies, SaCoNeT 2013
2013 | conference-paper
Wireless Cooperative Relaying Based On Opportunistic Relay Selection
International Journalon Advances in Networks and Services
2012 | journal-article
A framework for enforcing user-based authorization policies on packet filter firewalls
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | book
A negative selection approach to intrusion detection
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | book
A new location layer for the TCP/IP protocol stack
Computer Communication Review
2012 | conference-paper
Citizen-side handling of life event services
WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies
2012 | conference-paper
Identification of source applications for enhanced traffic analysis and anomaly detection
IEEE International Conference on Communications
2012 | conference-paper
Modeling pause time in social mobility models
Proceedings of the International Symposium on Wireless Communication Systems
2012 | conference-paper
Opportunistic relay selection for wireless cooperative network
2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops
2012 | conference-paper
Security model for the dynamic composition of workflows in e-government architectures,Modelo de segurança para a composição dinâmica de workflows em arquiteturas de e-government
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao
2012 | journal-article
A general interoperability architecture for e-government based on agents and web services
Proceedings of the 6th Iberian Conference on Information Systems and Technologies, CISTI 2011
2011 | conference-paper
Biometric authentication with electroencephalograms: Evaluation of its suitability using visual evoked potentials
Communications in Computer and Information Science
2011 | book
Citizen controlled exchange of information in e-government
WEBIST 2011 - Proceedings of the 7th International Conference on Web Information Systems and Technologies
2011 | conference-paper
Fast 802.11 handovers with 802.1X reauthentications
Security and Communication Networks
2011 | journal-article
Improving mobile networks based on social mobility modeling
Proceedings - International Conference on Network Protocols, ICNP
2011 | conference-paper
Interference-aware opportunistic relay selection
Proceedings of the ACM CoNEXT Student Workshop, CoNEXT 2011
2011 | conference-paper
Packet tagging system for enhanced traffic profiling
2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, IMSAA 2011 - Conference Proceedings
2011 | conference-paper
Pre-allocation of DHCP leases: A cross-layer approach
2011 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011 - Proceedings
2011 | conference-paper
RFID technology applied to students' backpacks
2011 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2011
2011 | conference-paper
Social networking for anonymous communication systems: A survey
Proceedings of the 2011 International Conference on Computational Aspects of Social Networks, CASoN'11
2011 | conference-paper
A 3GPP open-ID framework
2010 Future Network and Mobile Summit
2010 | conference-paper
Biometric authentication using brain responses to visual stimuli
BIOSIGNALS 2010 - Proceedings of the 3rd International Conference on Bio-inpsired Systems and Signal Processing, Proceedings
2010 | conference-paper
Fast VPN mobility across Wi-Fi hotspots
2010 2nd International Workshop on Security and Communication Networks, IWSCN 2010
2010 | conference-paper
Segurança em Redes Informáticas (3ª Edição Atualizada e Aumentada)
FCA - Editora de Informática
2010 | book
A security framework for cognitive radio IP based cooperative protocols
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
2009 | conference-paper
An overview of security ontologies
2009 | conference-paper
Protection of LAN-wide, P2P interactions: A holistic approach
International Journal of Communication Networks and Distributed Systems
2009 | journal-article
Security concerns in eGovernment agent-based interoperability
2009 | conference-paper
Authentication architecture for region-wide e-Health system with smartcards and a PKI
Communications in Computer and Information Science
2008 | book
Authentication of professionals in the RTS E-health system
HEALTHINF 2008 - 1st International Conference on Health Informatics, Proceedings
2008 | conference-paper
Enhanced secure interface for a portable e-voting terminal
SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings
2008 | conference-paper
Fast, secure handovers in 802.11: Back to the basis
Q2SWinet'08: Proceedings of the 4th ACM International Symposium on QoS and Security for Wireless and Mobile Networks
2008 | conference-paper
IS 2008 PC co-chairs' message
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008 | book
Improved CSMA/CA protocol for IEEE 802.11
4th EURO-NGI Conference on Next Generation Internet Networks - Proceedings
2008 | conference-paper
Physical-layer encryption with stream ciphers
IEEE International Symposium on Information Theory - Proceedings
2008 | conference-paper
Verifiable anonymous vote submission
Proceedings of the ACM Symposium on Applied Computing
2008 | conference-paper
Voto Electrónico - Discussão Técnica dos Seus Problemas e Oportunidades
Voto Electrónico - Discussão Técnica dos Seus Problemas e Oportunidades
2008 | book
Authentication architecture for eHealth professionals
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007 | book
A security architecture for protecting LAN interactions
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006 | book
An electronic voting system supporting vote weights
Internet Research
2006 | journal-article
An efficient high quality random number generator for multi-programmed systems
Journal of Computer Security
2005 | journal-article
Aplicação de HelpDesk baseada em PDAs, para apoio à manutenção do Parque Informático da Universidade de Aveiro
2005 | journal-article
StackFences: a run-time approach for detecting stack overflows
2004 | journal-article
REVS - A Robust Electronic Voting System
WWW / Internet
2003 | journal-article
Improving the Functionality of SYN Cookies
Advanced Communications and Multimedia Security
2002 | other
Segurança em comunicações remotas de aplicações legadas
Universidade de Lisboa Instituto Superior Técnico
2001 | dissertation-thesis
SPL: An access control language for security policies with complex constraints
Network and Distributed System Security Symposium
2001 | conference-paper
Enforcing obligation with security monitors
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2001 | book
Security Policy Consistency
2000 | preprint
Efficient error-propagating block chaining
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
1997 | book
Transparent authentication and confidentiality for stream sockets
IEEE Micro
1996 | journal-article
Orthogonal persistence in a heterogeneous distributed object-oriented environment
Computer Journal
1994 | journal-article
Distribution and persistence in the IK platform: Overview and evaluation
Computing systems
1993 | journal-article