Author of the publication

Finite Memory: A Vulnerability of Intrusion-Tolerant Systems.

, , , and . NCA, page 37-44. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Benchmarking some Portuguese S&T system research units, , , , and . CoRR, (2013)Solving Vector Consensus with a Wormhole., , and . IEEE Trans. Parallel Distributed Syst., 16 (12): 1120-1131 (2005)Requirements for high performance group support in distributed systems., , and . ACM SIGOPS European Workshop, ACM, (1992)Randomization can be a healer: consensus with dynamic omission failures., , , and . Distributed Comput., 24 (3-4): 165-175 (2011)Experiences with Fault-Injection in a Byzantine Fault-Tolerant Protocol., , , , , , and . Middleware, volume 8275 of Lecture Notes in Computer Science, page 41-61. Springer, (2013)A framework for dependable QoS adaptation in probabilistic environments., , , , and . SAC, page 2192-2196. ACM, (2008)Towards secure and dependable software-defined networks., , and . HotSDN, page 55-60. ACM, (2013)From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures., , and . Comput. J., 49 (1): 82-96 (2006)Support for Distributed CSCW Applications., , , and . Advances in Distributed Systems, volume 1752 of Lecture Notes in Computer Science, page 295-326. Springer, (1999)CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture., , and . CRITIS, volume 4347 of Lecture Notes in Computer Science, page 1-14. Springer, (2006)