Electronic Voting Using Identity Based Cryptography.
Proceedings of the Fourth International Conference on Digital Society, 2010
Log Analysis Towards an Automated Forensic Diagnosis System.
Proceedings of the ARES 2010, 2010
A New and Secure Electronic Voting Protocol Based on Bilinear Pairings.
Proceedings of the CONIELECOMP 2009, 2009
A Log Correlation Model to Support the Evidence Search Process in a Forensic Investigation.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007
An example of communication between security tools: iptables - snort.
ACM SIGOPS Oper. Syst. Rev., 2005
Overview the Key Management in Ad Hoc Networks.
Proceedings of the Advanced Distributed Systems: 5th International School and Symposium, 2005
Data Hiding in Identification and Offset IP Fields.
Proceedings of the Advanced Distributed Systems: 5th International School and Symposium, 2005
Security Challenges of Distributed <i>e</i>-Learning Systems.
Proceedings of the Advanced Distributed Systems: 5th International School and Symposium, 2005
Using Lamport's Logical Clocks to Consolidate Log Files from Different Sources.
Proceedings of the Innovative Internet Community Systems, 5th International Workshop, 2005
The Incidence of the Controllable Parameters in Routing Algorithms Based on Ant Colony Optimization.
Proceedings of the Procedings of the 6th International Conference on Principles of Distributed Systems. OPODIS 2002, 2002
A Protocol for WorkGroup in Industrial Environments Based on MMS.
Proceedings of the Distributed Computing, 1998