Algoritmi | User | André Ventura da Cruz Marnôto Zúquete

André Ventura da Cruz Marnôto Zúquete

André Ventura da Cruz Marnôto Zúquete

At LASI

Member of the IEETA R&D Unit

Academic Degree

Current Position

at

Personal Webpage

Personal Email

Orcid

0000-0002-9745-4361

Researcher ID

FCT Public Key

Ciência ID

6618-2113-6A6F

Google Scholar

Enhancing 802.1X authentication with identity providers using EAP-OAUTH and OAuth 2.0

Computer Networks

2024 | journal-article

A federated authentication schema among multiple identity providers

Heliyon

2024 | journal-article

Adaptive, Multi-Factor Authentication as a Service for Web Applications

2023 | conference-paper

VPN User Authentication Using Centralized Identity Providers

ICNS 2023 : The Nineteenth International Conference on Networking and Services

2023 | conference-paper

VPN User Authentication Using Centralized Identity Providers

The Nineteenth International Conference on Networking and Services (ICNS 2023)

2023 | conference-paper

The state of the art of the electronic bill of lading [version 1; peer review: 1 approved with reservations]

2022 | journal-article

A Fair Channel Hopping Scheme for LoRa Networks with Multiple Single-Channel Gateways

Sensors

2022 | journal-article

Secure Browsing in Local Government: The Case of Portugal

Journal of Web Engineering

2021 | journal-article

A Pseudonymisation Protocol With Implicit and Explicit Consent Routes for Health Records in Federated Ledgers

IEEE Journal of Biomedical and Health Informatics

2021 | journal-article

Security and privacy of the Internet of Things

Computers & Security

2021 | journal-article

Segurança em Redes Informáticas (6ª Edição Atualizada e Aumentada)

FCA

2021 | book

Trading hardware with medium reservation to tackle scalability in low-cost, single-channel LoRa networks

2021 | journal-article

EAP-SH: An EAP Authentication Protocol to Integrate Captive Portals in the 802.1X Security Architecture

Wireless Personal Communications

2020 | journal-article

An Efficient and Secure Alert System for VANETs to Improve Crosswalks’ Security in Smart Cities

Sensors

2020 | journal-article

A parser to support the definition of access control policies and rules using natural languages

2020 | journal-article

Complementing vehicular connectivity coverage through cellular networks

2020 | conference-paper

Evolution of HTTPS Usage by Portuguese Municipalities

2020 | journal-article

QoE of Video Streaming in Multihomed Vehicular Networks

Proceedings of the 4th Internet-QoE Workshop on QoE-based Analysis and Management of Data Communication Networks - Internet-QoE'19

2019 | conference-paper

Security-Oriented Architecture for Managing IoT Deployments

Symmetry

2019 | journal-article

Integration of the Captive Portal paradigm with the 802.1X architecture

2019 | preprint

Smart Crosswalks: A Safe Alert System That Minimizes The Confrontation Between Vehicles and Pedestrians

Proceedings of the International Conferences ICT, Society, and Human Beings 2019; Connected Smart Cities 2019; and Web Based Communities and Social Media 2019

2019 | conference-paper

The impact of ECDSA in a VANET routing service: Insights from real data traces

Ad Hoc Networks

2019 | journal-article

An Architecture to Support the Invocation of Personal Services in Web Interactions

2019 | preprint

Preface

IFIP Advances in Information and Communication Technology

2019 | book

Survey of Passengers’ Origin-Destination in Public Transportation Networks Using Wi-Fi

Communications in Computer and Information Science

2019 | book-chapter

Usage of HTTPS by municipal websites in Portugal

Advances in Intelligent Systems and Computing

2019 | book

Using reputation as a coin to bet on information items distributed in a smart city

2019 5th International Conference on Mobile and Secure Services, MOBISECSERV 2019

2019 | conference-paper

Federation of Attribute Providers for User Self-Sovereign Identity

Journal of Information Systems Engineering & Management

2018 | journal-article

TROPHY: Trustworthy VANET routing with group authentication keys

Ad Hoc Networks

2018 | journal-article

A propose for a federated ledger for regulated self-sovereignty

Iberian Conference on Information Systems and Technologies, CISTI

2018 | conference-paper

A trace-based emulator for vehicular ad hoc networks

SIMULTECH 2018 - Proceedings of 8th International Conference on Simulation and Modeling Methodologies, Technologies and Applications

2018 | conference-paper

Fast, scalable and secure over-the-air bootstrap of Linux operating systems with Wi-Fi ad hoc networks

Wireless Networks

2018 | journal-article

Multi-technology vs Single-technology Architecture for Network Coding in VANETs

Proceedings - IEEE Symposium on Computers and Communications

2018 | conference-paper

Segurança em Redes Informáticas (5ª Edição Atualizada)

FCA - Editora de Informática

2018 | book

Survey of Public Transport Routes using Wi-Fi

VEHITS 2018 - Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems

2018 | conference-paper

Vehicle-to-vehicle real-time video transmission through IEEE 802.11p for assisted-driving

IEEE Vehicular Technology Conference

2018 | conference-paper

Exploitation of dual channel transmissions to increase security and reliability in classic bluetooth piconets

Q2SWinet 2016 - Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks, co-located with MSWiM 2016

2016 | conference-paper

Privacy policies and practices in Portuguese local e-government

Electronic Government

2016 | journal-article

Traffic classification for managing Applications’ networking profiles

Security and Communication Networks

2016 | journal-article

Virtual Machine Halt

Proceedings of the ACM Symposium on Applied Computing

2016 | conference-paper

Towards dynamic adaptation in broadcasting with hybrid rateless codes

ACM SIGBED Review

2015 | journal-article

Secure and trustworthy file sharing over cloud storage using eID tokens

2015 | preprint

Application-specific traffic anomaly detection using universal background model

IWSPA 2015 - Proceedings of the 2015 ACM International Workshop on Security and Privacy Analytics, Co-located with CODASPY 2015

2015 | conference-paper

Authenticated file broadcast protocol

IFIP Advances in Information and Communication Technology

2015 | book

Orchestrating feedback for hybrid rateless codes

Proceedings of 21st European Wireless Conference, European Wireless 2015

2015 | conference-paper

Traffic classification and verification using unsupervised learning of Gaussian Mixture Models

2015 IEEE International Workshop on Measurements and Networking, M and N 2015 - Proceedings

2015 | conference-paper

Communications and Multimedia Security

Lecture Notes in Computer Science

2014 | book

DETIboot: a fast, wireless system to install operating systems on students laptops

2014 | conference-paper

Decentralized bootstrap for social overlay networks

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2014 | book

Fast image file distribution with Fountain codes via a Wi-Fi ad-hoc network, using low power processors

2014 16th International Telecommunications Network Strategy and Planning Symposium, Networks 2014

2014 | conference-paper

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2014 | book

Massively parallel identification of Privacy-Preserving vehicle rfid tags

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2014 | book

Personal identification in the web using electronic identity cards and a personal identity provider

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2014 | book

Self-adapted protocol for intra and inter-echelons communications

2014 16th International Telecommunications Network Strategy and Planning Symposium, Networks 2014

2014 | conference-paper

PROCESSO DE AGREGAÇÃO DE ATRIBUTOS DE UM UTENTE COM GARANTIA DE PRIVACIDADE

2013 | patent

A dependable alternative to the spanning tree protocol

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2013 | book

Agent-based interoperability for e-government

Advances in Intelligent Systems and Computing

2013 | book

Analysis of hybrid relaying in cooperative WLAN

IFIP Wireless Days

2013 | conference-paper

Biometric authentication using electroencephalograms: a practical study using visual evoked potentials

2013 | journal-article

Privacy policies in web sites of portuguese municipalities: An empirical study

Advances in Intelligent Systems and Computing

2013 | book

Segurança em Redes Informáticas (4ª Edição Atualizada)

FCA - Editora de Informática

2013 | book

User-centric, private networks of services

2013 International Conference on Smart Communications in Network Technologies, SaCoNeT 2013

2013 | conference-paper

Wireless Cooperative Relaying Based On Opportunistic Relay Selection

International Journalon Advances in Networks and Services

2012 | journal-article

A framework for enforcing user-based authorization policies on packet filter firewalls

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2012 | book

A negative selection approach to intrusion detection

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2012 | book

A new location layer for the TCP/IP protocol stack

Computer Communication Review

2012 | conference-paper

Citizen-side handling of life event services

WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies

2012 | conference-paper

Identification of source applications for enhanced traffic analysis and anomaly detection

IEEE International Conference on Communications

2012 | conference-paper

Modeling pause time in social mobility models

Proceedings of the International Symposium on Wireless Communication Systems

2012 | conference-paper

Opportunistic relay selection for wireless cooperative network

2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops

2012 | conference-paper

Security model for the dynamic composition of workflows in e-government architectures,Modelo de segurança para a composição dinâmica de workflows em arquiteturas de e-government

RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao

2012 | journal-article

A general interoperability architecture for e-government based on agents and web services

Proceedings of the 6th Iberian Conference on Information Systems and Technologies, CISTI 2011

2011 | conference-paper

Biometric authentication with electroencephalograms: Evaluation of its suitability using visual evoked potentials

Communications in Computer and Information Science

2011 | book

Citizen controlled exchange of information in e-government

WEBIST 2011 - Proceedings of the 7th International Conference on Web Information Systems and Technologies

2011 | conference-paper

Fast 802.11 handovers with 802.1X reauthentications

Security and Communication Networks

2011 | journal-article

Improving mobile networks based on social mobility modeling

Proceedings - International Conference on Network Protocols, ICNP

2011 | conference-paper

Interference-aware opportunistic relay selection

Proceedings of the ACM CoNEXT Student Workshop, CoNEXT 2011

2011 | conference-paper

Packet tagging system for enhanced traffic profiling

2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, IMSAA 2011 - Conference Proceedings

2011 | conference-paper

Pre-allocation of DHCP leases: A cross-layer approach

2011 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011 - Proceedings

2011 | conference-paper

RFID technology applied to students' backpacks

2011 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2011

2011 | conference-paper

Social networking for anonymous communication systems: A survey

Proceedings of the 2011 International Conference on Computational Aspects of Social Networks, CASoN'11

2011 | conference-paper

A 3GPP open-ID framework

2010 Future Network and Mobile Summit

2010 | conference-paper

Biometric authentication using brain responses to visual stimuli

BIOSIGNALS 2010 - Proceedings of the 3rd International Conference on Bio-inpsired Systems and Signal Processing, Proceedings

2010 | conference-paper

Fast VPN mobility across Wi-Fi hotspots

2010 2nd International Workshop on Security and Communication Networks, IWSCN 2010

2010 | conference-paper

Segurança em Redes Informáticas (3ª Edição Atualizada e Aumentada)

FCA - Editora de Informática

2010 | book

A security framework for cognitive radio IP based cooperative protocols

IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC

2009 | conference-paper

An overview of security ontologies

2009 | conference-paper

Protection of LAN-wide, P2P interactions: A holistic approach

International Journal of Communication Networks and Distributed Systems

2009 | journal-article

Security concerns in eGovernment agent-based interoperability

2009 | conference-paper

Authentication architecture for region-wide e-Health system with smartcards and a PKI

Communications in Computer and Information Science

2008 | book

Authentication of professionals in the RTS E-health system

HEALTHINF 2008 - 1st International Conference on Health Informatics, Proceedings

2008 | conference-paper

Enhanced secure interface for a portable e-voting terminal

SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings

2008 | conference-paper

Fast, secure handovers in 802.11: Back to the basis

Q2SWinet'08: Proceedings of the 4th ACM International Symposium on QoS and Security for Wireless and Mobile Networks

2008 | conference-paper

IS 2008 PC co-chairs' message

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2008 | book

Improved CSMA/CA protocol for IEEE 802.11

4th EURO-NGI Conference on Next Generation Internet Networks - Proceedings

2008 | conference-paper

Physical-layer encryption with stream ciphers

IEEE International Symposium on Information Theory - Proceedings

2008 | conference-paper

Verifiable anonymous vote submission

Proceedings of the ACM Symposium on Applied Computing

2008 | conference-paper

Voto Electrónico - Discussão Técnica dos Seus Problemas e Oportunidades

Voto Electrónico - Discussão Técnica dos Seus Problemas e Oportunidades

2008 | book

Authentication architecture for eHealth professionals

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2007 | book

A security architecture for protecting LAN interactions

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2006 | book

An electronic voting system supporting vote weights

Internet Research

2006 | journal-article

An efficient high quality random number generator for multi-programmed systems

Journal of Computer Security

2005 | journal-article

Aplicação de HelpDesk baseada em PDAs, para apoio à manutenção do Parque Informático da Universidade de Aveiro

2005 | journal-article

StackFences: a run-time approach for detecting stack overflows

2004 | journal-article

REVS - A Robust Electronic Voting System

WWW / Internet

2003 | journal-article

Improving the Functionality of SYN Cookies

Advanced Communications and Multimedia Security

2002 | other

Segurança em comunicações remotas de aplicações legadas

Universidade de Lisboa Instituto Superior Técnico

2001 | dissertation-thesis

SPL: An access control language for security policies with complex constraints

Network and Distributed System Security Symposium

2001 | conference-paper

Enforcing obligation with security monitors

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2001 | book

Security Policy Consistency

2000 | preprint

Efficient error-propagating block chaining

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

1997 | book

Transparent authentication and confidentiality for stream sockets

IEEE Micro

1996 | journal-article

Orthogonal persistence in a heterogeneous distributed object-oriented environment

Computer Journal

1994 | journal-article

Distribution and persistence in the IK platform: Overview and evaluation

Computing systems

1993 | journal-article

Enhancing 802.1X authentication with identity providers using EAP-OAUTH and OAuth 2.0

Computer Networks

2024 | journal-article

A federated authentication schema among multiple identity providers

Heliyon

2024 | journal-article

Adaptive, Multi-Factor Authentication as a Service for Web Applications

2023 | conference-paper

VPN User Authentication Using Centralized Identity Providers

ICNS 2023 : The Nineteenth International Conference on Networking and Services

2023 | conference-paper

VPN User Authentication Using Centralized Identity Providers

The Nineteenth International Conference on Networking and Services (ICNS 2023)

2023 | conference-paper

The state of the art of the electronic bill of lading [version 1; peer review: 1 approved with reservations]

2022 | journal-article

A Fair Channel Hopping Scheme for LoRa Networks with Multiple Single-Channel Gateways

Sensors

2022 | journal-article

Secure Browsing in Local Government: The Case of Portugal

Journal of Web Engineering

2021 | journal-article

A Pseudonymisation Protocol With Implicit and Explicit Consent Routes for Health Records in Federated Ledgers

IEEE Journal of Biomedical and Health Informatics

2021 | journal-article

Security and privacy of the Internet of Things

Computers & Security

2021 | journal-article

Segurança em Redes Informáticas (6ª Edição Atualizada e Aumentada)

FCA

2021 | book

Trading hardware with medium reservation to tackle scalability in low-cost, single-channel LoRa networks

2021 | journal-article

EAP-SH: An EAP Authentication Protocol to Integrate Captive Portals in the 802.1X Security Architecture

Wireless Personal Communications

2020 | journal-article

An Efficient and Secure Alert System for VANETs to Improve Crosswalks’ Security in Smart Cities

Sensors

2020 | journal-article

A parser to support the definition of access control policies and rules using natural languages

2020 | journal-article

Complementing vehicular connectivity coverage through cellular networks

2020 | conference-paper

Evolution of HTTPS Usage by Portuguese Municipalities

2020 | journal-article

QoE of Video Streaming in Multihomed Vehicular Networks

Proceedings of the 4th Internet-QoE Workshop on QoE-based Analysis and Management of Data Communication Networks - Internet-QoE'19

2019 | conference-paper

Security-Oriented Architecture for Managing IoT Deployments

Symmetry

2019 | journal-article

Integration of the Captive Portal paradigm with the 802.1X architecture

2019 | preprint

Smart Crosswalks: A Safe Alert System That Minimizes The Confrontation Between Vehicles and Pedestrians

Proceedings of the International Conferences ICT, Society, and Human Beings 2019; Connected Smart Cities 2019; and Web Based Communities and Social Media 2019

2019 | conference-paper

The impact of ECDSA in a VANET routing service: Insights from real data traces

Ad Hoc Networks

2019 | journal-article

An Architecture to Support the Invocation of Personal Services in Web Interactions

2019 | preprint

Preface

IFIP Advances in Information and Communication Technology

2019 | book

Survey of Passengers’ Origin-Destination in Public Transportation Networks Using Wi-Fi

Communications in Computer and Information Science

2019 | book-chapter

Usage of HTTPS by municipal websites in Portugal

Advances in Intelligent Systems and Computing

2019 | book

Using reputation as a coin to bet on information items distributed in a smart city

2019 5th International Conference on Mobile and Secure Services, MOBISECSERV 2019

2019 | conference-paper

Federation of Attribute Providers for User Self-Sovereign Identity

Journal of Information Systems Engineering & Management

2018 | journal-article

TROPHY: Trustworthy VANET routing with group authentication keys

Ad Hoc Networks

2018 | journal-article

A propose for a federated ledger for regulated self-sovereignty

Iberian Conference on Information Systems and Technologies, CISTI

2018 | conference-paper

A trace-based emulator for vehicular ad hoc networks

SIMULTECH 2018 - Proceedings of 8th International Conference on Simulation and Modeling Methodologies, Technologies and Applications

2018 | conference-paper

Fast, scalable and secure over-the-air bootstrap of Linux operating systems with Wi-Fi ad hoc networks

Wireless Networks

2018 | journal-article

Multi-technology vs Single-technology Architecture for Network Coding in VANETs

Proceedings - IEEE Symposium on Computers and Communications

2018 | conference-paper

Segurança em Redes Informáticas (5ª Edição Atualizada)

FCA - Editora de Informática

2018 | book

Survey of Public Transport Routes using Wi-Fi

VEHITS 2018 - Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems

2018 | conference-paper

Vehicle-to-vehicle real-time video transmission through IEEE 802.11p for assisted-driving

IEEE Vehicular Technology Conference

2018 | conference-paper

Exploitation of dual channel transmissions to increase security and reliability in classic bluetooth piconets

Q2SWinet 2016 - Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks, co-located with MSWiM 2016

2016 | conference-paper

Privacy policies and practices in Portuguese local e-government

Electronic Government

2016 | journal-article

Traffic classification for managing Applications’ networking profiles

Security and Communication Networks

2016 | journal-article

Virtual Machine Halt

Proceedings of the ACM Symposium on Applied Computing

2016 | conference-paper

Towards dynamic adaptation in broadcasting with hybrid rateless codes

ACM SIGBED Review

2015 | journal-article

Secure and trustworthy file sharing over cloud storage using eID tokens

2015 | preprint

Application-specific traffic anomaly detection using universal background model

IWSPA 2015 - Proceedings of the 2015 ACM International Workshop on Security and Privacy Analytics, Co-located with CODASPY 2015

2015 | conference-paper

Authenticated file broadcast protocol

IFIP Advances in Information and Communication Technology

2015 | book

Orchestrating feedback for hybrid rateless codes

Proceedings of 21st European Wireless Conference, European Wireless 2015

2015 | conference-paper

Traffic classification and verification using unsupervised learning of Gaussian Mixture Models

2015 IEEE International Workshop on Measurements and Networking, M and N 2015 - Proceedings

2015 | conference-paper

Communications and Multimedia Security

Lecture Notes in Computer Science

2014 | book

DETIboot: a fast, wireless system to install operating systems on students laptops

2014 | conference-paper

Decentralized bootstrap for social overlay networks

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2014 | book

Fast image file distribution with Fountain codes via a Wi-Fi ad-hoc network, using low power processors

2014 16th International Telecommunications Network Strategy and Planning Symposium, Networks 2014

2014 | conference-paper

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2014 | book

Massively parallel identification of Privacy-Preserving vehicle rfid tags

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2014 | book

Personal identification in the web using electronic identity cards and a personal identity provider

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2014 | book

Self-adapted protocol for intra and inter-echelons communications

2014 16th International Telecommunications Network Strategy and Planning Symposium, Networks 2014

2014 | conference-paper

PROCESSO DE AGREGAÇÃO DE ATRIBUTOS DE UM UTENTE COM GARANTIA DE PRIVACIDADE

2013 | patent

A dependable alternative to the spanning tree protocol

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2013 | book

Agent-based interoperability for e-government

Advances in Intelligent Systems and Computing

2013 | book

Analysis of hybrid relaying in cooperative WLAN

IFIP Wireless Days

2013 | conference-paper

Biometric authentication using electroencephalograms: a practical study using visual evoked potentials

2013 | journal-article

Privacy policies in web sites of portuguese municipalities: An empirical study

Advances in Intelligent Systems and Computing

2013 | book

Segurança em Redes Informáticas (4ª Edição Atualizada)

FCA - Editora de Informática

2013 | book

User-centric, private networks of services

2013 International Conference on Smart Communications in Network Technologies, SaCoNeT 2013

2013 | conference-paper

Wireless Cooperative Relaying Based On Opportunistic Relay Selection

International Journalon Advances in Networks and Services

2012 | journal-article

A framework for enforcing user-based authorization policies on packet filter firewalls

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2012 | book

A negative selection approach to intrusion detection

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2012 | book

A new location layer for the TCP/IP protocol stack

Computer Communication Review

2012 | conference-paper

Citizen-side handling of life event services

WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies

2012 | conference-paper

Identification of source applications for enhanced traffic analysis and anomaly detection

IEEE International Conference on Communications

2012 | conference-paper

Modeling pause time in social mobility models

Proceedings of the International Symposium on Wireless Communication Systems

2012 | conference-paper

Opportunistic relay selection for wireless cooperative network

2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops

2012 | conference-paper

Security model for the dynamic composition of workflows in e-government architectures,Modelo de segurança para a composição dinâmica de workflows em arquiteturas de e-government

RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao

2012 | journal-article

A general interoperability architecture for e-government based on agents and web services

Proceedings of the 6th Iberian Conference on Information Systems and Technologies, CISTI 2011

2011 | conference-paper

Biometric authentication with electroencephalograms: Evaluation of its suitability using visual evoked potentials

Communications in Computer and Information Science

2011 | book

Citizen controlled exchange of information in e-government

WEBIST 2011 - Proceedings of the 7th International Conference on Web Information Systems and Technologies

2011 | conference-paper

Fast 802.11 handovers with 802.1X reauthentications

Security and Communication Networks

2011 | journal-article

Improving mobile networks based on social mobility modeling

Proceedings - International Conference on Network Protocols, ICNP

2011 | conference-paper

Interference-aware opportunistic relay selection

Proceedings of the ACM CoNEXT Student Workshop, CoNEXT 2011

2011 | conference-paper

Packet tagging system for enhanced traffic profiling

2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, IMSAA 2011 - Conference Proceedings

2011 | conference-paper

Pre-allocation of DHCP leases: A cross-layer approach

2011 4th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2011 - Proceedings

2011 | conference-paper

RFID technology applied to students' backpacks

2011 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2011

2011 | conference-paper

Social networking for anonymous communication systems: A survey

Proceedings of the 2011 International Conference on Computational Aspects of Social Networks, CASoN'11

2011 | conference-paper

A 3GPP open-ID framework

2010 Future Network and Mobile Summit

2010 | conference-paper

Biometric authentication using brain responses to visual stimuli

BIOSIGNALS 2010 - Proceedings of the 3rd International Conference on Bio-inpsired Systems and Signal Processing, Proceedings

2010 | conference-paper

Fast VPN mobility across Wi-Fi hotspots

2010 2nd International Workshop on Security and Communication Networks, IWSCN 2010

2010 | conference-paper

Segurança em Redes Informáticas (3ª Edição Atualizada e Aumentada)

FCA - Editora de Informática

2010 | book

A security framework for cognitive radio IP based cooperative protocols

IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC

2009 | conference-paper

An overview of security ontologies

2009 | conference-paper

Protection of LAN-wide, P2P interactions: A holistic approach

International Journal of Communication Networks and Distributed Systems

2009 | journal-article

Security concerns in eGovernment agent-based interoperability

2009 | conference-paper

Authentication architecture for region-wide e-Health system with smartcards and a PKI

Communications in Computer and Information Science

2008 | book

Authentication of professionals in the RTS E-health system

HEALTHINF 2008 - 1st International Conference on Health Informatics, Proceedings

2008 | conference-paper

Enhanced secure interface for a portable e-voting terminal

SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings

2008 | conference-paper

Fast, secure handovers in 802.11: Back to the basis

Q2SWinet'08: Proceedings of the 4th ACM International Symposium on QoS and Security for Wireless and Mobile Networks

2008 | conference-paper

IS 2008 PC co-chairs' message

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2008 | book

Improved CSMA/CA protocol for IEEE 802.11

4th EURO-NGI Conference on Next Generation Internet Networks - Proceedings

2008 | conference-paper

Physical-layer encryption with stream ciphers

IEEE International Symposium on Information Theory - Proceedings

2008 | conference-paper

Verifiable anonymous vote submission

Proceedings of the ACM Symposium on Applied Computing

2008 | conference-paper

Voto Electrónico - Discussão Técnica dos Seus Problemas e Oportunidades

Voto Electrónico - Discussão Técnica dos Seus Problemas e Oportunidades

2008 | book

Authentication architecture for eHealth professionals

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2007 | book

A security architecture for protecting LAN interactions

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2006 | book

An electronic voting system supporting vote weights

Internet Research

2006 | journal-article

An efficient high quality random number generator for multi-programmed systems

Journal of Computer Security

2005 | journal-article

Aplicação de HelpDesk baseada em PDAs, para apoio à manutenção do Parque Informático da Universidade de Aveiro

2005 | journal-article

StackFences: a run-time approach for detecting stack overflows

2004 | journal-article

REVS - A Robust Electronic Voting System

WWW / Internet

2003 | journal-article

Improving the Functionality of SYN Cookies

Advanced Communications and Multimedia Security

2002 | other

Segurança em comunicações remotas de aplicações legadas

Universidade de Lisboa Instituto Superior Técnico

2001 | dissertation-thesis

SPL: An access control language for security policies with complex constraints

Network and Distributed System Security Symposium

2001 | conference-paper

Enforcing obligation with security monitors

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2001 | book

Security Policy Consistency

2000 | preprint

Efficient error-propagating block chaining

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

1997 | book

Transparent authentication and confidentiality for stream sockets

IEEE Micro

1996 | journal-article

Orthogonal persistence in a heterogeneous distributed object-oriented environment

Computer Journal

1994 | journal-article

Distribution and persistence in the IK platform: Overview and evaluation

Computing systems

1993 | journal-article

This user account status is Approved