Carlos Ribeiro

Orcid: 0000-0002-6080-0996

According to our database1, Carlos Ribeiro authored at least 56 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ARGAN-IDS: Adversarial Resistant Intrusion Detection Systems using Generative Adversarial Networks.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Enhanced Object Detection in Highly Compressed Images using Regions of Interest.
Proceedings of the 2023 6th International Conference on Sensors, 2023

2022
CIIA: critical infrastructure impact assessment.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

A feasibility study on real-time concealed object detection in foliage using STDCC radar.
Proceedings of the 13th International Symposium on Communication Systems, 2022

2020
Multi-Gigabit/s OFDM real-time based transceiver engine for emerging 5G MIMO systems.
Phys. Commun., 2020

BP-IDS: Using business process specification to leverage intrusion detection in critical infrastructures.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

All-digital reconfigurable STDCC radar baseband implementation in FPGA.
Proceedings of the 12th International Symposium on Communication Systems, 2020

2019
Privacy-preserving attribute aggregation in eID federations.
Future Gener. Comput. Syst., 2019

2018
STORK: a real, heterogeneous, large-scale eID management system.
Int. J. Inf. Sec., 2018

Will COTS RF Front-Ends Really Cope With 5G Requirements at mmWave?
IEEE Access, 2018

Integrated Photonic True-Time Delay Beamformer for a Ka-band Phased Array Antenna Receiver.
Proceedings of the Optical Fiber Communications Conference and Exposition, 2018

A mm Wave solution to provide wireless Augmented Reality in classrooms.
Proceedings of the 15th International Symposium on Wireless Communication Systems, 2018

2017
Consumer LED lamp with ODAC technology for high-speed visible light communications.
IEEE Trans. Consumer Electron., 2017

Lighting the Wireless World: The Promise and Challenges of Visible Light Communication.
IEEE Consumer Electron. Mag., 2017

2016
Employing Ontology-Alignment and Locality-Sensitive Hashing to Improve Attribute Interoperability in Federated eID Systems.
Complex Syst. Informatics Model. Q., 2016

Live demonstration: 150Mbps+ DCO-OFDM VLC.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

Single carrier optical FDM in visible light communication.
Proceedings of the 10th International Symposium on Communication Systems, 2016

DLL architecture for OFDM based VLC transceivers in FPGA.
Proceedings of the 10th International Symposium on Communication Systems, 2016

Towards Privacy-preserving Attribute Aggregation in Federated eID Systems.
Proceedings of the CAiSE'16 Forum, 2016

An Ontology-Based Interoperability Solution for Electronic-Identity Systems.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
A real-time platform for collaborative research on Visible Light Communication.
Proceedings of the 4th International Workshop on Optical Wireless Communications, 2015

2014
MobiPag: Integrated Mobile Payment, Ticketing and Couponing Solution Based on NFC.
Sensors, 2014

Evaluation of an Integrated Mobile Payment, Ticketing and Couponing Solution Based on NFC.
Proceedings of the New Perspectives in Information Systems and Technologies, 2014

Local Password Validation Using Self-Organizing Maps.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
A Framework for Robust Address Assignment in WSNs Whispering to Avoid Intruders.
Int. J. Distributed Sens. Networks, 2013

EVIV: An end-to-end verifiable Internet voting system.
Comput. Secur., 2013

Leveraging Honest Users: Stealth Command-and-Control of Botnets.
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013

2012
Jano: location-privacy enforcement in mobile and pervasive environments through declarative policies.
J. Internet Serv. Appl., 2012

MobUser: Publish-subscribe Communication for Mobile Nodes.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

2011
An Efficient and Highly Sound Voter Verification Technique and Its Implementation.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

Next Generation Smart Home Systems Using Hardware Acceleration Techniques.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2011

WiFiHop - Mitigating the Evil Twin Attack through Multi-hop Detection.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
Improving Remote Voting Security with CodeVoting.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Jano: specification and enforcement of location privacy in mobile and pervasive environments.
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2010), 2010

Incentive mechanisms in peer-to-peer networks.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Observable non-Sybil quorums construction in one-hop wireless ad hoc networks.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
VeryVote: A Voter Verifiable Code Voting System.
Proceedings of the E-Voting and Identity, Second International Conference, 2009

Verme: Worm containment in overlay networks.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Mitigating CFO in OFDM systems by exploring the symbol structure.
Proceedings of the 2008 5th International Symposium on Wireless Communication Systems, 2008

2007
A Policy-Oriented Language for Expressing Security Specifications.
Int. J. Netw. Secur., 2007

CodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment.
Proceedings of the E-Voting and Identity, First International Conference, 2007

A scalable and flexible web services authentication model.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

An Efficient Intrusion Detection System for Networks with Centralized Routing.
Proceedings of the SECRYPT 2007, 2007

On the impact of the pilot density in the channel estimation of MC-CDMA systems.
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007

Verme: Worm Containment in Peer-to-Peer Overlays.
Proceedings of the 6th International workshop on Peer-To-Peer Systems, 2007

CodeVoting: protecting against malicious vote manipulation at the voter's PC.
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007

2006
A Scalable History-Based Policy Engine.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

Heimdhal: A History-Based Policy Engine for Grids.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2004
A Roaming Authentication Solution for WiFi Using IPSec VPNs With Client Certificates.
Proceedings of the One step ahead, 2004

2003
OBIWAN: Design and Implementation of a Middleware Platform.
IEEE Trans. Parallel Distributed Syst., 2003

Enforcing History-Based Security Policies in Mobile Agent Systems.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Symmetric eigenfilters for partial shortening in ADSL DMT transceivers.
Proceedings of the Seventh International Symposium on Signal Processing and Its Applications, 2003

2001
SPL: An Access Control Language for Security Policies and Complex Constraints.
Proceedings of the Network and Distributed System Security Symposium, 2001

Enforcing Obligation with Security Monitors.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Security Policy Consistency
CoRR, 2000

1999
Verifying Workflow Processes against Organization Security Policies.
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999


  Loading...