Author of the publication

A conservative strategy to protect P2P file sharing systems from pollution attacks.

, , , and . Concurr. Comput. Pract. Exp., 23 (1): 117-141 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flexible and secure service discovery in ubiquitous computing., , and . J. Netw. Comput. Appl., 33 (2): 128-140 (2010)A conservative strategy to protect P2P file sharing systems from pollution attacks., , , and . Concurr. Comput. Pract. Exp., 23 (1): 117-141 (2011)Trends in User Identity and Continuous Authentication., , , , , , , , and . Computer, 55 (11): 52-61 (2022)HealthStack: Providing an IoT Middleware for Malleable QoS Service Stacking for Hospital 4.0 Operating Rooms., , , , , , , , and . IEEE Internet Things J., 9 (19): 18406-18430 (2022)A Fog and Blockchain Software Architecture for a Global Scale Vaccination Strategy., , , , , and . IEEE Access, (2022)ID-Care: A Model for Sharing Wide Healthcare Data., , , , , and . IEEE Access, (2023)Utilizando relações entre objetos para melhorar o desempenho de redes orientadas a conteúdo.. Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil, (2016)ndltd.org (oai:agregador.ibict.br.BDTD_UFRGS:oai:www.lume.ufrgs.br:10183/142180).Distribuição de Conteúdo Sob Demanda Através da Alocação de Microserviços Dinâmicos na Borda e Núcleo da Rede., , , , and . SBRC, page 575-588. (2020)Continuum: A Service-Based Software Infrastructure for Ubiquitous Computing., , , , , and . PerCom, page 1-4. IEEE Computer Society, (2009)Exploring your neighborhood: Comparing connection strategies in swarming networks through evolving graphs., , and . P2P, page 1-10. IEEE, (2013)