Author:
Correia Claudio,Correia Miguel,Rodrigues Luis
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Defending Against Free-Riders Attacks in Distributed Generative Adversarial Networks;Financial Cryptography and Data Security;2023-12-01
2. Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
3. PoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage Systems;2023 IEEE 28th Pacific Rim International Symposium on Dependable Computing (PRDC);2023-10-24
4. MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands;Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses;2023-10-16
5. Fault Tolerant Edge Computing: Challenges and Opportunities;2023 IEEE 7th International Conference on Fog and Edge Computing (ICFEC);2023-05-01