Luis Filipe Coelho Antunes

Orcid: 0000-0002-9988-594X

Affiliations:
  • University of Porto, Portugal


According to our database1, Luis Filipe Coelho Antunes authored at least 72 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Towards a data privacy-predictive performance trade-off.
Expert Syst. Appl., August, 2023

Survey on Privacy-Preserving Techniques for Microdata Publication.
ACM Comput. Surv., 2023

A Three-Way Knot: Privacy, Fairness, and Predictive Performance Dynamics.
Proceedings of the Progress in Artificial Intelligence, 2023

2022
The case for blockchain in IoT identity management.
J. Enterp. Inf. Manag., 2022

Host-based IDS: A review and open issues of an anomaly detection system in IoT.
Future Gener. Comput. Syst., 2022

Privacy-Preserving Data Synthetisation for Secure Information Sharing.
CoRR, 2022

Survey on Privacy-Preserving Techniques for Data Publishing.
CoRR, 2022

IoT security certifications: Challenges and potential approaches.
Comput. Secur., 2022

Threat Detection and Mitigation with Honeypots: A Modular Approach for IoT.
Proceedings of the Trust, Privacy and Security in Digital Business, 2022

2021
Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE.
Sensors, 2021

Towards a Modular On-Premise Approach for Data Sharing.
Sensors, 2021

On Conditional Tsallis Entropy.
Entropy, 2021

The Entropy Universe.
Entropy, 2021

2020
Profiling IT Security and Interoperability in Brazilian Health Organisations From a Business Perspective.
Int. J. E Health Medical Commun., 2020

Nonlinear Methods Most Applied to Heart-Rate Time Series: A Review.
Entropy, 2020

Empowering Users Through a Privacy Middleware Watchdog.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

2019
Breaking MPC implementations through compression.
Int. J. Inf. Sec., 2019

Iris: Secure reliable live-streaming with opportunistic mobile edge cloud offloading.
Future Gener. Comput. Syst., 2019

A Survey on Using Kolmogorov Complexity in Cybersecurity.
Entropy, 2019

pTASC: trustable autonomous secure communications.
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019

Secure Provisioning for Achieving End-to-End Secure Communications.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2019

2018
Evaluating the Privacy Properties of Secure VoIP Metadata.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Enforcing Privacy and Security in Public Cloud Storage.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

How-to Express Explicit and Auditable Consent.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Sifting Through Chaos: Extracting Information from Unstructured Legal Opinions.
Proceedings of the Building Continents of Knowledge in Oceans of Data: The Future of Co-Created eHealth, 2018

HS.Register - An Audit-Trail Tool to Respond to the General Data Protection Regulation (GDPR).
Proceedings of the Building Continents of Knowledge in Oceans of Data: The Future of Co-Created eHealth, 2018

What We Do: Challenges in Individual Rationality and Its Collective Consequences.
Proceedings of the 10th International Conference on Agents and Artificial Intelligence, 2018

Witness Hiding Without Extractors or Simulators.
Proceedings of the Sailing Routes in the World of Computation, 2018

2017
On the rate of decrease in logical depth.
Theor. Comput. Sci., 2017

Sophistication vs Logical Depth.
Theory Comput. Syst., 2017

Entropy and Compression Capture Different Complexity Features: The Case of Fetal Heart Rate.
Entropy, 2017

2016
Distinguishing Two Probability Ensembles with One Sample from each Ensemble.
Theory Comput. Syst., 2016

Digital Signatures Workflows in Alfresco.
Proceedings of the Electronic Government and the Information Systems Perspective, 2016

2014
A Safe Approximation for Kolmogorov Complexity.
Proceedings of the Algorithmic Learning Theory - 25th International Conference, 2014

2013
One-Way Functions Using Algorithmic and Classical Information Theories.
Theory Comput. Syst., 2013

On the logical depth function
CoRR, 2013

On Logical Depth and the Running Time of Shortest Programs.
CoRR, 2013

Sophistication as Randomness Deficiency.
Proceedings of the Descriptional Complexity of Formal Systems, 2013

Physician's awareness of e-prescribing security risks.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

2012
Conditional Rényi Entropies.
IEEE Trans. Inf. Theory, 2012

Low-Depth Witnesses are Easy to Find.
Comput. Complex., 2012

Robustness of Logical Depth.
Proceedings of the How the World Computes, 2012

One Way to Patient Empowerment - The Proposal of an Authorization Model.
Proceedings of the HEALTHINF 2012 - Proceedings of the International Conference on Health Informatics, Vilamoura, Algarve, Portugal, 1, 2012

Federated Health Registers - A Literature Review.
Proceedings of the HEALTHINF 2012 - Proceedings of the International Conference on Health Informatics, Vilamoura, Algarve, Portugal, 1, 2012

2011
Entropy Measures vs. Kolmogorov Complexity.
Entropy, 2011

Comparing security and privacy issues of EHR: Portugal, the Netherlands and the United Kingdom.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011

Usability of authentication and access control: A case study in healthcare.
Proceedings of the International Carnahan Conference on Security Technology, 2011

Leveraging identity management interoperability in eHealth.
Proceedings of the International Carnahan Conference on Security Technology, 2011

Usable access control policy and model for healthcare.
Proceedings of the 24th IEEE International Symposium on Computer-Based Medical Systems, 2011

Evaluation of a Teleradiology System - Impact and User Satisfaction.
Proceedings of the HEALTHINF 2011, 2011

2010
Information measures for infinite sequences.
Theor. Comput. Sci., 2010

Grounding information security in healthcare.
Int. J. Medical Informatics, 2010

Access Control in Healthcare: the methodology from legislation to practice.
Proceedings of the MEDINFO 2010, 2010

Entropy measures vs. algorithmic information.
Proceedings of the IEEE International Symposium on Information Theory, 2010

From Legislation to Practice - A Case Study of Break the Glass in Healthcare.
Proceedings of the HEALTHINF 2010, 2010

2009
Depth as Randomness Deficiency.
Theory Comput. Syst., 2009

Sophistication Revisited.
Theory Comput. Syst., 2009

Commitment and authentication systems.
Des. Codes Cryptogr., 2009

Worst-Case Running Times for Average-Case Algorithms.
Proceedings of the 24th Annual IEEE Conference on Computational Complexity, 2009

How to Securely Break into RBAC: The BTG-RBAC Model.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
A First Approach for a Regional Wide VEPR.
Proceedings of the First International Conference on Health Informatics, 2008


2007
Cryptographic Security of Individual Instances.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

2006
Computational depth: Concept and applications.
Theor. Comput. Sci., 2006

Galois Field Commitment Scheme.
IACR Cryptol. ePrint Arch., 2006

A secure wireless architecture to access a virtual electronic patient record.
Proceedings of the 1st International ICST Conference on Pervasive Computing Technologies for Healthcare, 2006

Clustering Fetal Heart Rate Tracings by Compression.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

How to Break Access Control in a Controlled Manner.
Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), 2006

2005
Time-Bounded Universal Distributions
Electron. Colloquium Comput. Complex., 2005

2004
Integrity for Electronic Patient Record Reports.
Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems (CBMS 2004), 2004

2003
Using Depth to Capture Average-Case Complexity.
Proceedings of the Fundamentals of Computation Theory, 14th International Symposium, 2003

2001
Computational Depth.
Proceedings of the 16th Annual IEEE Conference on Computational Complexity, 2001


  Loading...