Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Citizen Controlled Exchange of Information in e-Government., , and . WEBIST, page 494-499. SciTePress, (2011)Physical-layer encryption with stream ciphers., and . ISIT, page 106-110. IEEE, (2008)Improving the functionality of syn cookies.. Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, page 57-77. Kluwer, (2002)An efficient high quality random number generator for multi-programmed systems.. Journal of Computer Security, 13 (2): 243-263 (2005)Opportunistic Relay Selection for Wireless Cooperative Network., , and . NTMS, page 1-4. IEEE, (2012)Traffic classification for managing Applications' networking profiles., and . Security and Communication Networks, 9 (14): 2557-2575 (2016)Usage of HTTPS by Municipal Websites in Portugal., , , and . WorldCIST (2), volume 931 of Advances in Intelligent Systems and Computing, page 155-164. Springer, (2019)Distribution and Persistence in the IK Platform: Overview and Evaluation., , , , , , , and . Computing Systems, 6 (4): 391-424 (1993)Traffic classification and verification using unsupervised learning of Gaussian Mixture Models., , and . M&N, page 1-6. IEEE, (2015)Pseudonymisation with Break-the-Glass Compatibility for Health Records in Federated Services., , and . BIBE, page 274-277. IEEE, (2019)