Author of the publication

An Infrastructure for Long-Term Archiving of Authenticated and Sensitive Electronic Documents.

, , , , and . EuroPKI, volume 6711 of Lecture Notes in Computer Science, page 193-207. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experiências com tolerância a faltas no CORBA e extensões ao FT-CORBA para sistemas distribuidos de larga escala.. Federal University of Santa Catarina, Brazil, (2001)ndltd.org (oai:repositorio.ufsc.br:123456789/81470).MITRA: byzantine fault-tolerant middleware for transaction processing on replicated databases., , and . SIGMOD Record, 43 (1): 32-38 (2014)Integrating the ROMIOP and ETF Specifications for Atomic Multicast in CORBA., , , and . OTM Conferences (1), volume 3760 of Lecture Notes in Computer Science, page 680-697. Springer, (2005)An Infrastructure for Long-Term Archiving of Authenticated and Sensitive Electronic Documents., , , , and . EuroPKI, volume 6711 of Lecture Notes in Computer Science, page 193-207. Springer, (2010)SeRViSO: a selective retransmission scheme for video streaming in overlay networks., , and . SAC, page 694-698. ACM, (2010)Sharing Memory between Byzantine Processes Using Policy-Enforced Tuple Spaces., , , and . IEEE Trans. Parallel Distributed Syst., 20 (3): 419-432 (2009)BackupIT: An Intrusion-Tolerant Cooperative Backup System., , , and . ACIS-ICIS, page 724-729. IEEE Computer Society, (2009)A Public Keys Based Architecture for P2P Identification, Content Authenticity and Reputation., , , , and . AINA Workshops, page 159-164. IEEE Computer Society, (2009)Finite Memory: A Vulnerability of Intrusion-Tolerant Systems., , , and . NCA, page 37-44. IEEE Computer Society, (2008)Byzantine Fault-Tolerant Transaction Processing for Replicated Databases., , and . NCA, page 83-90. IEEE Computer Society, (2011)