Biblio
Found 15 results
Filters: Author is Miguel Correia [Clear All Filters]
RockFS: Cloud-backed File System Resilience to Client-Side Attacks. 2018 ACM/IFIP/USENIX International Middleware Conference.
.
2018. S-Audit: Efficient Data Integrity Verification for Cloud Storage. IEEE TrustCom.
.
2018. Securing Electronic Health Records in the Cloud. W-P2DS Workshop, co-located with EuroSys.
.
2018. Storing Critical Data in the Cloud: Challenges and Solutions. 13th International Conference on Software Technologies (ICSOFT).
.
2018. DroidPosture: A Trusted Posture Assessment Service for Mobile Devices. Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
.
2017. Hail to the Thief: Protecting Data from Mobile Ransomware with ransomSafeDroid. IEEE 16th International Symposium on Network Computing and Applications (NCA).
.
2017. Rectify: Black-Box Intrusion Recovery in PaaS Clouds. Proceedings of the 2017 ACM/IFIP/USENIX International Middleware Conference.
.
2017. T2Droid: A TrustZone-based Dynamic Analyser for Android Applications. Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
.
2017. TruApp: A TrustZone-based Authenticity Detection Service for Mobile Apps. Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
.
2017. Vulnerability-Tolerant Transport Layer Security. Proceedings of the 21st International Conference on Principles of Distributed Systems (OPODIS).
.
2017. DARSHANA: Detecting Route Hijacking For Communication Confidentiality. The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016).
.
2016. Leveraging an Homomorphic Encryption Library to Implement a Coordination Service (short paper). The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016).
.
2016. MACHETE: Multi-path Communication for Cloud Security. The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016).
.
2016. NoSQL Undo: Recovering NoSQL Databases by Undoing Operations. The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016).
.
2016. vtTLS: A Vulnerability-Tolerant Communication Protocol (short paper). The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016).
.
2016.