Eduardo da Silva
Orcid: 0000-0001-6070-7532
According to our database1,
Eduardo da Silva
authored at least 23 papers
between 2008 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Comput. Electron. Agric., 2022
2020
Security challenges to smart agriculture: Current state, key issues, and future directions.
Array, 2020
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations.
Proceedings of the 2020 IFIP Networking Conference, 2020
2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Safeguarding from abuse by IoT vendors: Edge messages verification of cloud-assisted equipment.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
2016
J. Comput. Networks Commun., 2016
Organizing intelligent vehicles at traffic lights to decrease travel time in a double lane road.
Proceedings of the IEEE 12th International Conference on Intelligent Computer Communication and Processing, 2016
2014
PhD thesis, 2014
Travel time management using time compensation scheme for a traffic exclusively of autonomous vehicles in a double lane highway.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014
2013
Uma Avaliação do Esquema de Gerenciamento de Chave Baseado em Identidade Identity Key Management.
RITA, 2013
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013
2012
True: A Trust Evaluation Service for Mobile Ad Hoc Networks Resistant to Malicious Attacks.
J. Digit. Inf. Manag., 2012
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012
2011
Resisting to False Identities Attacks to the Public-Key Management System for Wireless Ad Hoc Networks.
Proceedings of the Mobile Networks and Management - Third International ICST Conference, 2011
2010
Implications of Misbehaving Attacks on Probabilistic Quorum System for MANETs.
Proceedings of the SECRYPT 2010, 2010
2009
Resisting Impersonation Attacks in Chaining-based Public-Key Management on Manets - The Virtual Public-key Management.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the Integrated Network Management, 2009
2008
Identity-based key management in mobile ad hoc networks: techniques and applications.
IEEE Wirel. Commun., 2008
Quantifying Misbehaviour Attacks Against the Self-Organized Public Key Management on Manets.
Proceedings of the SECRYPT 2008, 2008
Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks.
Proceedings of the e-Business and Telecommunications - International Conference, 2008