Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RS4VANETs - a decentralized reputation system for assessing the trustworthiness of nodes in vehicular networks., , , and . IWCMC, page 268-273. IEEE, (2015)A National Mobile Identity Management Strategy for Electronic Government Services., , and . TrustCom/BigDataSE, page 668-673. IEEE, (2018)A National Identity Management Strategy to Enhance the Brazilian Electronic Government., , , , , and . CLEI Electron. J., (2017)Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems., , , and . SRDS, page 66-75. IEEE Computer Society, (2003)Mediation of Trust across Web Services., and . ICWS, page 515-522. IEEE Computer Society, (2005)A Model for Authentication Credentials Translation in Service Oriented Architecture., , , , and . Trans. Comput. Sci., (2009)Building Trust Chains between CORBA Objects., , , and . LADC, volume 2847 of Lecture Notes in Computer Science, page 102-116. Springer, (2003)National strategy of identity management to boost Brazilian electronic government program., , , , , and . CLEI, page 1-12. IEEE, (2016)Multi-factor authentication for shibboleth identity providers., , , , , , and . J. Internet Serv. Appl., 11 (1): 8 (2020)Evaluation of P2P Search Algorithms for Discovering Trust Paths., , and . EPEW, volume 4748 of Lecture Notes in Computer Science, page 112-124. Springer, (2007)