André Zúquete

Orcid: 0000-0002-9745-4361

Affiliations:
  • University of Aveiro, IEETA, Portugal


According to our database1, André Zúquete authored at least 83 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhancing 802.1X authentication with identity providers using EAP-OAUTH and OAuth 2.0.
Comput. Networks, 2024

2022
A Fair Channel Hopping Scheme for LoRa Networks with Multiple Single-Channel Gateways.
Sensors, 2022

Trading hardware with medium reservation to tackle scalability in low-cost, single-channel LoRa networks.
Internet Technol. Lett., 2022

2021
A Pseudonymisation Protocol With Implicit and Explicit Consent Routes for Health Records in Federated Ledgers.
IEEE J. Biomed. Health Informatics, 2021

Secure Browsing in Local Government: The Case of Portugal.
J. Web Eng., 2021

Security and privacy of the Internet of Things.
Comput. Secur., 2021

2020
EAP-SH: An EAP Authentication Protocol to Integrate Captive Portals in the 802.1X Security Architecture.
Wirel. Pers. Commun., 2020

An Efficient and Secure Alert System for VANETs to Improve Crosswalks' Security in Smart Cities.
Sensors, 2020

RAIAP: renewable authentication on isolated anonymous profiles.
Peer-to-Peer Netw. Appl., 2020

A Parser to Support the Definition of Access Control Policies and Rules Using Natural Languages.
J. Medical Syst., 2020

Timely Classification and Verification of Network Traffic Using Gaussian Mixture Models.
IEEE Access, 2020

Evolution of HTTPS Usage by Portuguese Municipalities.
Proceedings of the Trends and Innovations in Information Systems and Technologies, 2020

Complementing Vehicular Connectivity Coverage through Cellular Networks.
Proceedings of the 27th International Conference on Telecommunications, 2020

2019
Security-Oriented Architecture for Managing IoT Deployments.
Symmetry, 2019

Integration of the Captive Portal paradigm with the 802.1X architecture.
CoRR, 2019

An Architecture to Support the Invocation of Personal Services in Web Interactions.
CoRR, 2019

The impact of ECDSA in a VANET routing service: Insights from real data traces.
Ad Hoc Networks, 2019

Usage of HTTPS by Municipal Websites in Portugal.
Proceedings of the New Knowledge in Information Systems and Technologies, 2019

QoE of Video Streaming in Multihomed Vehicular Networks.
Proceedings of the 4th Internet-QoE Workshop on QoE-based Analysis and Management of Data Communication Networks, 2019

Pseudonymisation with Break-the-Glass Compatibility for Health Records in Federated Services.
Proceedings of the 19th IEEE International Conference on Bioinformatics and Bioengineering, 2019

2018
Fast, scalable and secure over-the-air bootstrap of Linux operating systems with Wi-Fi ad hoc networks.
Wirel. Networks, 2018

TROPHY: Trustworthy VANET routing with group authentication keys.
Ad Hoc Networks, 2018

Vehicle-to-Vehicle Real-Time Video Transmission through IEEE 802.11p for Assisted-Driving.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

Survey of Public Transport Routes using Wi-Fi.
Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems, 2018

Survey of Passengers' Origin-Destination in Public Transportation Networks Using Wi-Fi.
Proceedings of the Smart Cities, Green Technologies and Intelligent Transport Systems, 2018

loop - A Trace-based Emulator for Vehicular Ad Hoc Networks.
Proceedings of 8th International Conference on Simulation and Modeling Methodologies, 2018

Multi-technology vs Single-technology Architecture for Network Coding in VANETs.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

2016
Traffic classification for managing Applications' networking profiles.
Secur. Commun. Networks, 2016

Privacy policies and practices in Portuguese local e-government.
Electron. Gov. an Int. J., 2016

Virtual machine halt.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Exploitation of Dual Channel Transmissions to Increase Security and Reliability in Classic Bluetooth Piconets.
Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2016

2015
Towards dynamic adaptation in broadcasting with hybrid rateless codes.
SIGBED Rev., 2015

Authenticated File Broadcast Protocol.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Traffic classification and verification using unsupervised learning of Gaussian Mixture Models.
Proceedings of the IEEE International Workshop on Measurements & Networking, 2015

Application-Specific Traffic Anomaly Detection Using Universal Background Model.
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015

2014
Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

Secure and trustworthy file sharing over cloud storage using eid tokens.
Proceedings of the Open Identity Summit 2014, November 4-6, 2014, Stuttgart, Germany, 2014

Decentralized Bootstrap for Social Overlay Networks.
Proceedings of the Communications and Multimedia Security, 2014

2013
Privacy Policies in Web Sites of Portuguese Municipalities: An Empirical Study.
Proceedings of the Advances in Information Systems and Technologies [WorldCIST'13, 2013

Analysis of hybrid relaying in cooperative WLAN.
Proceedings of the IFIP Wireless Days, 2013

A Dependable Alternative to the Spanning Tree Protocol.
Proceedings of the Dependable Computing - 14th European Workshop, 2013

Agent-Based Interoperability for e-Government.
Proceedings of the Distributed Computing and Artificial Intelligence, 2013

2012
A new location layer for the TCP/IP protocol stack.
Comput. Commun. Rev., 2012

Citizen-side Handling of Life Event Services.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012

Opportunistic Relay Selection for Wireless Cooperative Network.
Proceedings of the 5th International Conference on New Technologies, 2012

Modeling pause time in social mobility models.
Proceedings of the 2012 International Symposium on Wireless Communication Systems (ISWCS), 2012

Identification of source applications for enhanced traffic analysis and anomaly detection.
Proceedings of IEEE International Conference on Communications, 2012

A Negative Selection Approach to Intrusion Detection.
Proceedings of the Artificial Immune Systems - 11th International Conference, 2012

A Framework for Enforcing User-Based Authorization Policies on Packet Filter Firewalls.
Proceedings of the Communications and Multimedia Security, 2012

2011
Fast 802.11 handovers with 802.1X reauthentications.
Secur. Commun. Networks, 2011

Citizen Controlled Exchange of Information in e-Government.
Proceedings of the WEBIST 2011, 2011

RFID technology applied to students' backpacks.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

Pre-Allocation of DHCP Leases: A Cross-Layer Approach.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Improving mobile networks based on social mobility modeling.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

Interference-aware opportunistic relay selection.
Proceedings of The ACM CoNEXT Student Workshop, 2011

Social networking for anonymous communication systems: A survey.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

2010
Biometric Authentication with Electroencephalograms: Evaluation of Its Suitability Using Visual Evoked Potentials.
Proceedings of the Biomedical Engineering Systems and Technologies, 2010

Biometric Authentication using Brain Responses to Visual Stimuli.
Proceedings of the BIOSIGNALS 2010, 2010

2009
A security framework for cognitive radio IP based cooperative protocols.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

2008
A TCP-layer Name Service for TCP Ports.
Proceedings of the 2008 USENIX Annual Technical Conference, 2008

Enhanced Secure Interface for a Portable e-Voting Terminal.
Proceedings of the SECRYPT 2008, 2008

Verifiable anonymous vote submission.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

IS 2008 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Fast, secure handovers in 802.11: back to the basis.
Proceedings of the Q2SWinet'08, 2008

Physical-layer encryption with stream ciphers.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Authentication Architecture for Region-Wide e-Health System with Smartcards and a PKI.
Proceedings of the Biomedical Engineering Systems and Technologies, 2008

Authentication of Professionals in the RTS E-Health System.
Proceedings of the First International Conference on Health Informatics, 2008

2007
Authentication Architecture for eHealth Professionals.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

2006
An electronic voting system supporting vote weights.
Internet Res., 2006

An Electronic Voting System Supporting VoteWeights.
Proceedings of the Security in Information Systems, 2006

A Security Architecture for Protecting LAN Interactions.
Proceedings of the Information Security, 9th International Conference, 2006

2005
An efficient high quality random number generator for multi-programmed systems.
J. Comput. Secur., 2005

2004
A Roaming Authentication Solution for WiFi Using IPSec VPNs With Client Certificates.
Proceedings of the One step ahead, 2004

STACKFENCES: A Run-Time Approach for Detecting Stack Overflows.
Proceedings of the ICETE 2004, 2004

2002
Improving the functionality of syn cookies.
Proceedings of the Advanced Communications and Multimedia Security, 2002

2001
SPL: An Access Control Language for Security Policies and Complex Constraints.
Proceedings of the Network and Distributed System Security Symposium, 2001

Enforcing Obligation with Security Monitors.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Security Policy Consistency
CoRR, 2000

1997
Efficient Error-Propagating Block Chaining.
Proceedings of the Cryptography and Coding, 1997

1996
Transparent authentication and confidentiality for stream sockets.
IEEE Micro, 1996

1994
Orthogonal Persistence in a Heterogeneous Distributed Object-Oriented Environment.
Comput. J., 1994

1993
Distribution and Persistence in the IK Platform: Overview and Evaluation.
Comput. Syst., 1993


  Loading...