Leonardo B. Oliveira

Orcid: 0000-0002-3691-6171

Affiliations:
  • Federal University of Minas Gerais, Belo Horizonte, Brazil


According to our database1, Leonardo B. Oliveira authored at least 60 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Higher education's influence on social networks and entrepreneurship in Brazil.
Soc. Netw. Anal. Min., 2023

2022
Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities.
Comput. Secur., 2022

2021
Bayesian Optimization with a Prior for the Optimum.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021

2020
Agro 4.0: A data science-based information system for sustainable agroecosystem management.
Simul. Model. Pract. Theory, 2020

Prior-guided Bayesian Optimization.
CoRR, 2020

FLAT: Federated lightweight authentication for the Internet of Things.
Ad Hoc Networks, 2020

2019
DOD-ETL: distributed on-demand ETL for near real-time business intelligence.
J. Internet Serv. Appl., 2019

SIoT: Securing Internet of Things through distributed systems analysis.
Future Gener. Comput. Syst., 2019

Agro 4.0: A Green Information System for Sustainable Agroecosystem Management.
CoRR, 2019

A Federated Lightweight Authentication Protocol for the Internet of Things.
CoRR, 2019

Challenges and Directions for Authentication in Pervasive Computing.
CoRR, 2019

StartupBR: Higher Education's Influence on Social Networks and Entrepreneurship in Brazil.
CoRR, 2019

DeepFreak: Learning Crystallography Diffraction Patterns with Automated Machine Learning.
CoRR, 2019

Evaluating Post-quantum Signatures for IoT Devices.
Proceedings of the Green, Pervasive, and Cloud Computing - 14th International Conference, 2019

2018
The computer for the 21st century: present security & privacy challenges.
J. Internet Serv. Appl., 2018

NomadiKey: User authentication for smart devices based on nomadic keys.
Int. J. Netw. Manag., 2018

Autenticação Federada para IoT Aplicada a um Sistema Automático de Estacionamento.
Proceedings of the Companion Proceedings of the 36th Brazilian Symposium on Computer Networks and Distributed Systems, 2018

FLAT: Um Protocolo de Autenticação Federada para a Internet das Coisas.
Proceedings of the XXXVI Brazilian Symposium on Computer Networks and Distributed Systems, 2018

Federated authentication of things: demo abstract.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018

Attributed-based authentication and access control for IoT home devices: demo abstract.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018

2017
Proof-Carrying Sensing: Towards Real-World Authentication in Cyber-Physical Systems.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Securing networked embedded systems code through distributed systems analysis.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

The Computer for the 21st Century: Security & Privacy Challenges after 25 Years.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

2016
High performance moves recognition and sequence segmentation based on key poses filtering.
Proceedings of the 2016 IEEE Winter Conference on Applications of Computer Vision, 2016

AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

NomadiKey: User authentication for smart devices based on nomadic keys.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Symbolic range analysis of pointers.
Proceedings of the 2016 International Symposium on Code Generation and Optimization, 2016

SMOV: Array Bound-Check and access in a single instruction.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
SIoT: securing the internet of things through distributed system analysis.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

2014
Defending Code from the Internet of Things against Buffer Overflow.
Proceedings of the 2014 Brazilian Symposium on Computer Networks and Distributed Systems, 2014

Validation of memory accesses through symbolic analyses.
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, 2014

2013
Wireless Sensor Network Security.
Int. J. Distributed Sens. Networks, 2013

End-to-end authentication in Under-Water Sensor Networks.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

ID-MAC: An identity-based MAC protocol for Wireless Sensor Networks.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

2012
Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller.
J. Cryptogr. Eng., 2012

Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks.
Comput. J., 2012

MAC protocols for wireless sensor networks over radio-over-fiber links.
Proceedings of IEEE International Conference on Communications, 2012

2011
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks.
Comput. Commun., 2011

2010
Efficient implementation of elliptic curve cryptography in wireless sensors.
Adv. Math. Commun., 2010

2009
Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks.
Comput. Commun., 2009

Secure-TWS: Authenticating node to multi-user communication in shared sensor networks.
Proceedings of the 8th International Conference on Information Processing in Sensor Networks, 2009

P2P over MANETs.
Proceedings of the Mobile Peer-to-Peer Computing for Next Generation Distributed Environments, 2009

2008
Cryptographic key distribuition in sensor networks.
PhD thesis, 2008

NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks.
Proceedings of the Wireless Sensor Networks, 5th European Conference, 2008

2007
SecLEACH - On the security of clustered sensor networks.
Signal Process., 2007

On the design of secure protocols for hierarchical sensor networks.
Int. J. Secur. Networks, 2007

TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks.
IACR Cryptol. ePrint Arch., 2007

TinyTate: Identity-Based Encryption for Sensor Networks.
IACR Cryptol. ePrint Arch., 2007

SOS: Secure Overlay Sensornets.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Identity-Based Encryption for Sensor Networks.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

2006
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks.
Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006

WISENEP: A Network Processor for Wireless Sensor Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
On the performance of ad hoc routing protocols under a peer-to-peer application.
J. Parallel Distributed Comput., 2005

Evaluation of Peer-to-Peer Network Content Discovery Techniques over Mobile Ad Hoc Networks.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

LHA-SP: secure protocols for hierarchical wireless sensor networks.
Proceedings of the Integrated Network Management, 2005

On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks.
Proceedings of the Networking, 2005

2004
Fault management in event-driven wireless sensor networks.
Proceedings of the 7th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2004

2003
Evaluation of ad-hoc routing protocols under a peer-to-peer application.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Artemis: An Event Operation Tool for Telecommunication Management Systems.
Proceedings of the 3rd Latin American Network Operations and Management Symposium, 2003


  Loading...