Jean Everson Martina

Orcid: 0000-0003-4104-1741

According to our database1, Jean Everson Martina authored at least 37 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SovereignRx: An Electronic Prescription System Based on High Privacy, Blockchain, and Self-Sovereign Identity.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic.
Sensors, August, 2023

2022
Blockchain Privacy and Scalability in a Decentralized Validated Energy Trading Context with Hyperledger Fabric.
Sensors, 2022

2021
Steganographic Analysis of Blockchains.
Sensors, 2021

Accurate and decentralized timestamping using smart contracts on the Ethereum blockchain.
Inf. Process. Manag., 2021

2020
Document Validation using Blockchain: A validation scheme for natural persons documents.
Proceedings of the Companion Proceedings of the 38th Brazilian Symposium on Computer Networks and Distributed Systems, 2020

F2MH Cryptosystem: Preliminary analysis of an original attempt to revive Knapsack-based public-key encryption schemes.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020

Fraud Prevention Within the Brazilian Governmental Public-Key Infrastructure.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

SRVB cryptosystem: another attempt to revive Knapsack-based public-key encryption schemes.
Proceedings of the 27th International Conference on Telecommunications, 2020

Bitcoin Blockchain Steganographic Analysis.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Blockchain and smart contracts for higher education registry in Brazil.
Int. J. Netw. Manag., 2019

A Transparent and Privacy-Aware Approach Using Smart Contracts for Car Insurance Reward Programs.
Proceedings of the Information Systems Security - 15th International Conference, 2019

Digital Degree Certificates for Higher Education in Brazil: A Technical Policy Specification.
Proceedings of the ACM Symposium on Document Engineering 2019, 2019

2018
Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018

Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies.
Proceedings of the Security Protocols XXVI, 2018

Privacy Preserving on Trajectories Created by Wi-Fi Connections in a University Campus.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Tuning the Winternitz hash-based digital signature scheme.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

2017
Design and Large-scale Evaluation of Educational Games for Teaching Sorting Algorithms.
Informatics Educ., 2017

Private Verification of Access on Medical Data: An Initial Study.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
SORTIA 2.0:Um jogo de ordenação para o ensino de Estrutura de Dados [SORTIA 2.0: A sorting game for data structure teaching].
Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era, 2016

Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks.
Proceedings of the Information Systems Security - 12th International Conference, 2016

Threat Modelling Service Security as a Security Ceremony.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Automated Issuance of Digital Certificates through the Use of Federations.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
An adaptive threat model for security ceremonies.
Int. J. Inf. Sec., 2015

Verifying multicast-based security protocols using the inductive method.
Int. J. Inf. Sec., 2015

2014
Modelling User Devices in Security Ceremonies.
Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014

A Proposal for a Unified Identity Card for Use in an Academic Federation Environment.
Proceedings of the Ninth International Conference on Availability, 2014

2013
The Ever Changing Threat Model: A Social-Technical Perspective.
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013

An updated threat model for security ceremonies.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

A cross-layer approach to trustfulness in the Internet of Things.
Proceedings of the 16th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2013

2012
Towards a Formal Verification of a Multi-factor Authentication Protocol Using Automated Theorem Provers.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Proposed Framework for Analysing Security Ceremonies.
Proceedings of the SECRYPT 2012, 2012

2011
Verification of security protocols based on multicast communication.
PhD thesis, 2011

2009
Economics Applied to Information Security: The Brazilian Electronic Bill of Sale Case.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009

Ceremonies Formal Analysis in PKI's Context.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Audit and backup procedures for hardware security modules.
Proceedings of the IDtrust 2008, 2008

2007
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules.
Proceedings of the Public Key Infrastructure, 2007


  Loading...