Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bitcoin Transactions Types and Their Impact on Storage Scalability., , , and . WETICE, page 1-6. IEEE, (2023)Using Bitmaps for Executing Range Queries in Encrypted Databases., and . SECRYPT, page 432-438. SciTePress, (2014)A Study of the Forwarding Blackhole phenomenon during Software-Defined Network Updates., , , , and . SDS, page 186-193. IEEE, (2019)Requirements for Feistel-based Lightweight Block Cipher S-boxes to be Resilient to Boomerang Attacks., , and . ENC, page 1-8. IEEE, (2023)A Cryptographic Study of Tokenization Systems., , and . SECRYPT, page 393-398. SciTePress, (2014)Unraveling Spatio-Temporal Behavior in Collaborative Cyber-Physical Systems Inspired by Social Insects., , , , , and . WETICE, page 1-6. IEEE, (2023)Towards Consistent VNF Forwarding Graph Reconfiguration in Multi-domain Environments., , , , , and . CLOUD, page 355-366. IEEE, (2021)RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases., and . STM, volume 8203 of Lecture Notes in Computer Science, page 115-130. Springer, (2013)Indirect Spatiotemporal Short-Range Vehicle Communication Approach Inspired on Capillary Waves., , , and . Res. Comput. Sci., 149 (3): 105-111 (2020)