Biblio
Found 15 results
Filters: Author is Miguel Correia  [Clear All Filters]
.  
2018.  RockFS: Cloud-backed File System Resilience to Client-Side Attacks. 2018 ACM/IFIP/USENIX International Middleware Conference. 
.  
2018.  S-Audit: Efficient Data Integrity Verification for Cloud Storage. IEEE TrustCom. 
.  
2018.  Securing Electronic Health Records in the Cloud. W-P2DS Workshop, co-located with EuroSys. 
.  
2018.  Storing Critical Data in the Cloud: Challenges and Solutions. 13th International Conference on Software Technologies (ICSOFT). 
.  
2017.  DroidPosture: A Trusted Posture Assessment Service for Mobile Devices. Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). 
.  
2017.  Hail to the Thief: Protecting Data from Mobile Ransomware with ransomSafeDroid. IEEE 16th International Symposium on Network Computing and Applications (NCA). 
.  
2017.  Rectify: Black-Box Intrusion Recovery in PaaS Clouds. Proceedings of the 2017 ACM/IFIP/USENIX International Middleware Conference. 
.  
2017.  T2Droid: A TrustZone-based Dynamic Analyser for Android Applications. Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 
.  
2017.  TruApp: A TrustZone-based Authenticity Detection Service for Mobile Apps. Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). 
.  
2017.  Vulnerability-Tolerant Transport Layer Security. Proceedings of the 21st International Conference on Principles of Distributed Systems (OPODIS). 
.  
2016.  DARSHANA: Detecting Route Hijacking For Communication Confidentiality. The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016). 
.  
2016.  Leveraging an Homomorphic Encryption Library to Implement a Coordination Service (short paper). The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016). 
.  
2016.  MACHETE: Multi-path Communication for Cloud Security. The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016). 
.  
2016.  NoSQL Undo: Recovering NoSQL Databases by Undoing Operations. The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016). 
.  
2016.  vtTLS: A Vulnerability-Tolerant Communication Protocol (short paper). The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016).