From post

Economics Applied to Information Security: The Brazilian Electronic Bill of Sale Case.

, и . Web Intelligence/IAT Workshops, стр. 307-310. IEEE Computer Society, (2009)978-0-7695-3801-3.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules., , и . EuroPKI, том 4582 из Lecture Notes in Computer Science, стр. 220-235. Springer, (2007)Audit and backup procedures for hardware security modules., , и . IDtrust, том 283 из ACM International Conference Proceeding Series, стр. 89-97. ACM, (2008)Steganographic Analysis of Blockchains., , и . Sensors, 21 (12): 4078 (2021)A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic., , и . Sensors, 23 (15): 6933 (августа 2023)SORTIA 2.0:Um jogo de ordenação para o ensino de Estrutura de Dados SORTIA 2.0: A sorting game for data structure teaching., , , , и . SBSI, стр. 558-565. ACM, (2016)A Proposal for a Unified Identity Card for Use in an Academic Federation Environment., , и . ARES, стр. 265-272. IEEE Computer Society, (2014)An adaptive threat model for security ceremonies., , , , и . Int. J. Inf. Sec., 14 (2): 103-121 (2015)A Transparent and Privacy-Aware Approach Using Smart Contracts for Car Insurance Reward Programs., , , и . ICISS, том 11952 из Lecture Notes in Computer Science, стр. 3-20. Springer, (2019)Document Validation using Blockchain: A validation scheme for natural persons documents., , и . SBRC Companion, стр. 249-256. (2020)Tuning the Winternitz hash-based digital signature scheme., , , , и . ISCC, стр. 537-542. IEEE, (2018)