Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch. Match!
Paulo Veríssimo
University of Luxembourg
277Publications
38H-index
5,749Citations
Publications 277
Newest
Published on Apr 1, 2019in IEEE Internet of Things Journal 9.52
Antônio Augusto Fröhlich12
Estimated H-index: 12
(UFSC: Universidade Federal de Santa Catarina),
Roberto Milton Scheffel1
Estimated H-index: 1
(UFSC: Universidade Federal de Santa Catarina)
+ 1 AuthorsPaulo Veríssimo38
Estimated H-index: 38
(University of Luxembourg)
Wireless sensor networks (WSNs), often adhering to a single gateway architecture, constitute the communication backbone for many modern cyber-physical systems (CPSs). Consequently, fault-tolerance in CPS becomes a challenging task, especially when accounting for failures (potentially malicious) that incapacitate the gateway or disrupt the nodes-gateway communication, not to mention the energy, timeliness, and security constraints demanded by CPS domains. This paper aims at ameliorating the fault...
Published on Jan 1, 2019in IACR Cryptology ePrint Archive
Tong Cao , Jiangshan Yu5
Estimated H-index: 5
+ 2 AuthorsPaulo Veríssimo38
Estimated H-index: 38
Published on Jun 25, 2018
Tong Cao (University of Luxembourg), Jiangshan Yu5
Estimated H-index: 5
(University of Luxembourg)
+ 1 AuthorsPaulo Veríssimo38
Estimated H-index: 38
(University of Luxembourg)
Published on Apr 16, 2018
Vincent Rahli8
Estimated H-index: 8
(University of Luxembourg),
Ivana Vukotic1
Estimated H-index: 1
(University of Luxembourg)
+ 1 AuthorsPaulo Veríssimo38
Estimated H-index: 38
(University of Luxembourg)
Our increasing dependence on complex and critical information infrastructures and the emerging threat of sophisticated attacks, ask for extended efforts to ensure the correctness and security of these systems. Byzantine fault-tolerant state-machine replication (BFT-SMR) provides a way to harden such systems. It ensures that they maintain correctness and availability in an application-agnostic way, provided that the replication protocol is correct and at least \(n-f\) out of n replicas survive ar...
Published on Jan 1, 2018
Cristian Mirto , Jiangshan Yu5
Estimated H-index: 5
+ 1 AuthorsPaulo Veríssimo38
Estimated H-index: 38
(University of Luxembourg)
Published on Dec 1, 2017
Marcus Völp10
Estimated H-index: 10
(University of Luxembourg),
David Kozhaya1
Estimated H-index: 1
(University of Luxembourg),
Paulo Veríssimo38
Estimated H-index: 38
(University of Luxembourg)
Published on Jan 1, 2017
Maria Fernandes1
Estimated H-index: 1
(University of Luxembourg),
Jérémie Decouchant3
Estimated H-index: 3
(University of Luxembourg)
+ 1 AuthorsPaulo Veríssimo38
Estimated H-index: 38
(University of Luxembourg)
Thanks to the rapid advances in sequencing technologies, genomic data is now being produced at an unprecedented rate. To adapt to this growth, several algorithms and paradigm shifts have been proposed to increase the throughput of the classical DNA workflow, e.g. by relying on the cloud to perform CPU intensive operations. However, the scientific community raised an alarm due to the possible privacy-related attacks that can be executed on genomic data. In this paper we review the state of the ar...
12345678910