Author of the publication

Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.

, , , , , and . Sensors, 18 (3): 753 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GTrust: Group Extension for Trust Models in Distributed Systems., , and . IJDSN, (2014)Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography., , , , and . Sensors, 18 (5): 1306 (2018)Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services., , , , , and . Sensors, 18 (3): 753 (2018)Load Balancing and Survivability for Network Services Based on Intelligent Agents., , , , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 868-881. Springer, (2004)File Exchange in a Private Cloud Supported by a Trust Model., , , and . CyberC, page 89-96. IEEE Computer Society, (2012)SisBrAV - Brazilian Vulnerability Alert System., , , , , and . WOSIS, page 67-76. INSTICC Press, (2005)Distributed Data Service for Data Management in Internet of Things Middleware., , , , , and . Sensors, 17 (5): 977 (2017)File Exchange in Cloud., , , and . TrustCom, page 1217-1222. IEEE Computer Society, (2012)A Proposed Protocol for Periodic Monitoring of Cloud Storage Services Using Trust and Encryption., , , and . ICCSA (2), volume 9787 of Lecture Notes in Computer Science, page 45-59. Springer, (2016)Survivability for a Network Service and Load Balancing Using Intelligent Agents Software., , , , and . EUC, volume 3207 of Lecture Notes in Computer Science, page 734-744. Springer, (2004)