Lucy in the sky without diamonds: Stealing confidential data in the cloud F Rocha, M Correia 2011 IEEE/IFIP 41st International Conference on Dependable Systems and …, 2011 | 261 | 2011 |
End-to-end reliability in wireless sensor networks: Survey and research challenges PR Pereira, A Grilo, F Rocha, MS Nunes, A Casaca, C Chaudet, ... EuroFGI Workshop on IP QoS and Traffic Control 54, 67-74, 2007 | 99 | 2007 |
The final frontier: Confidentiality and privacy in the cloud F Rocha, S Abreu, M Correia Computer 44 (9), 44-50, 2011 | 79 | 2011 |
Towards safe and secure autonomous and cooperative vehicle ecosystems A Lima, F Rocha, M Völp, P Esteves-Veríssimo Proceedings of the 2nd ACM workshop on cyber-physical systems security and …, 2016 | 66 | 2016 |
Defense-in-depth Against Malicious Insiders in the Cloud F Rocha, T Gross, A van Moorsel IEEE International Conference on Cloud Engineering, 88 - 97, 2013 | 43 | 2013 |
Performance evaluation of DTSN in wireless sensor networks F Rocha, A Grilo, PR Pereira, MS Nunes, A Casaca Wireless Systems and Mobility in Next Generation Internet: 4th International …, 2008 | 21 | 2008 |
Logging solutions to mitigate risks associated with threats in infrastructure as a service cloud W Wongthai, F Rocha, A Van Moorsel 2013 International Conference on Cloud Computing and Big Data, 163-170, 2013 | 16 | 2013 |
A generic logging template for infrastructure as a service cloud W Wongthai, FL Rocha, A van Moorsel 2013 27th International Conference on Advanced Information Networking and …, 2013 | 12 | 2013 |
Avoiding leakage and synchronization attacks through enclave-side preemption control M Völp, A Lackorzynski, J Decouchant, V Rahli, F Rocha, ... Proceedings of the 1st Workshop on System Software for Trusted Execution, 1-6, 2016 | 8 | 2016 |
Lucy in the sky without diamonds: Stealing confidential data in the cloud. In 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshop (DSN-W) F Rocha, M Correia IEEE, 2010 | 6 | 2010 |
Meeting the challenges of critical and extreme dependability and security P Esteves-Verissimo, M Völp, J Decouchant, V Rahli, F Rocha 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing …, 2017 | 4 | 2017 |
The Next Frontier: Managing Confidentiality and Integrity of Data in the Cloud F Rocha, S Abreu, M Correia IEEE Computer Society Press, 2013 | 4 | 2013 |
Privacy in Cloud Computing F Rocha Carnegie Mellon University / University of Lisbon, 2010 | 3 | 2010 |
Computing apparatus M Völp, P Esteves-Veríssimo, J Decouchant, V Rahli, F Rocha US Patent 11,416,617, 2022 | 2 | 2022 |
Insider threat: memory confidentiality and integrity in the cloud F Rocha LAP Lambert Academic Publishing, 2015 | 2 | 2015 |
Insider threat: memory confidentiality and integrity in the cloud FE Liberal Rocha Newcastle University, 2015 | 2 | 2015 |
A generic logging support architecture for infrastructure as a service (IaaS) cloud W Wongthai, FL Rocha, AV Moorsel School of Computing Science, 2012 | 2 | 2012 |
Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come M Völp, F Rocha, J Decouchant, J Yu, P Esteves-Verissimo Security Protocols XXV: 25th International Workshop, Cambridge, UK, March 20 …, 2017 | 1 | 2017 |
Deconstructing minbft for security and verifiability V Rahli, F Rocha, M Völp, P Esteves-Verissimo Grand Region Security and Reliability Day, 0 | 1 | |
Experience Report: How to Design Web-Based Competitions for Legal Proceedings: Lessons from a Court Case A Van Moorsel, M Forshaw, F Rocha 2017 IEEE 28th International Symposium on Software Reliability Engineering …, 2017 | | 2017 |