Marcos A. Simplício Jr.

Orcid: 0000-0001-5227-7165

Affiliations:
  • University of Sao Paulo, Brazil


According to our database1, Marcos A. Simplício Jr. authored at least 65 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Amazon Biobank: Assessing the Implementation of a Blockchain-Based Genomic Database.
IEEE Access, 2024

DVID: Adding Delegated Authentication to SPIFFE Trusted Domains.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Faster verification of V2X basic safety messages via Message Chaining.
Veh. Commun., December, 2023

Blind signatures from Zero knowledge in the Kummer variety.
IACR Cryptol. ePrint Arch., 2023

Benchmarking the Security Protocol and Data Model (SPDM) for component authentication.
CoRR, 2023

Performance analysis of the Raft consensus algorithm on Hyperledger Fabric and Ethereum on cloud.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

2022
Message verification with ECDSA: ECVQ vs SIMPL certificates.
Dataset, May, 2022

Faster verification of V2X BSM messages via Message Chaining.
IACR Cryptol. ePrint Arch., 2022

Securing hard drives with the Security Protocol and Data Model (SPDM).
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2022

2021
Revocation in Vehicular Public Key Infrastructures: Balancing privacy and efficiency.
Veh. Commun., 2021

Privacy-Preserving Certificate Linkage/Revocation in VANETs Without Linkage Authorities.
IEEE Trans. Intell. Transp. Syst., 2021

Schnorr-Based Implicit Certification: Improving the Security and Efficiency of Vehicular Communications.
IEEE Trans. Computers, 2021

z-OTS: a one-time hash-based digital signaturescheme with fast verification.
IACR Cryptol. ePrint Arch., 2021

Container Allocation and Deallocation Traceability using Docker Swarm with Consortium Hyperledger Blockchain.
Proceedings of the 11th International Conference on Cloud Computing and Services Science, 2021

2020

Fast Additive Partially Homomorphic Encryption From the Approximate Common Divisor Problem.
IEEE Trans. Inf. Forensics Secur., 2020

A Fair, Traceable, Auditable and Participatory Randomization Tool for Legal Systems.
CoRR, 2020

2019
Experimental data for - Dizang A solution for collecting forensic evidences in cloud environments.
Dataset, May, 2019

Faster Key Compression for Isogeny-Based Cryptosystems.
IEEE Trans. Computers, 2019

Accelerated V2X provisioning with Extensible Processor Platform.
IACR Cryptol. ePrint Arch., 2019

Schnorr-based implicit certification: improving the security and efficiency of V2X communications.
IACR Cryptol. ePrint Arch., 2019

ACPC: Efficient revocation of pseudonym certificates using activation codes.
Ad Hoc Networks, 2019

Designing and Assessing Multi-tenant Isolation Strategies for Cloud Networks.
Proceedings of the 22nd Conference on Innovation in Clouds, 2019

2018
The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications.
IACR Cryptol. ePrint Arch., 2018

Privacy-preserving linkage/revocation of VANET certificates without LAs.
IACR Cryptol. ePrint Arch., 2018

A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks.
IACR Cryptol. ePrint Arch., 2018

qSCMS: Post-quantum certificate provisioning process for V2X.
IACR Cryptol. ePrint Arch., 2018

A framework for enabling security services collaboration across multiple domains.
Comput. Electr. Eng., 2018

Privacy-Preserving Method for Temporarily Linking/Revoking Pseudonym Certificates in VANETs.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Demonstration of a framework for enabling security services collaboration across multiple domains.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Multi-tenant Isolation of What?: Building a Secure Tenant Isolation Architecture for Cloud Networks.
Proceedings of the ACM Symposium on Cloud Computing, 2018

A Taxonomy Model for Single Sign-on Oriented towards Cloud Computing.
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018

Using Externals IdPs on OpenStack: A Security Analysis of OpenID Connect, Facebook Connect, and OpenStack Authentication.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Energy-efficient node position identification through payoff matrix and variability analysis.
Telecommun. Syst., 2017

Faster isogeny-based compressed key agreement.
IACR Cryptol. ePrint Arch., 2017

Lightweight and escrow-less authenticated key agreement for the internet of things.
Comput. Commun., 2017

2016
Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs.
IEEE Trans. Computers, 2016

Georeferenced and secure mobile health system for large scale data collection in primary care.
Int. J. Medical Informatics, 2016

2015
SecourHealth: A Delay-Tolerant Security Framework for Mobile Health Data Collection.
IEEE J. Biomed. Health Informatics, 2015

Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs.
IACR Cryptol. ePrint Arch., 2015

OCP: A protocol for secure communication in federated content networks.
Comput. Commun., 2015

Classifying Security Threats in Cloud Networking.
Proceedings of the CLOSER 2015, 2015

2014
SecureTCG: a lightweight cheating-detection protocol for P2P multiplayer online trading card games.
Secur. Commun. Networks, 2014

Lyra: password-based key derivation with tunable memory and processing costs.
J. Cryptogr. Eng., 2014


2013
SMSCrypto: A lightweight cryptographic framework for secure SMS transmission.
J. Syst. Softw., 2013

Mobile health in emerging countries: A survey of research initiatives in Brazil.
Int. J. Medical Informatics, 2013

Survey and comparison of message authentication solutions on wireless sensor networks.
Ad Hoc Networks, 2013

2012
Revisiting the Security of the ALRED Design and Two of Its Variants: Marvin and LetterSoup.
IEEE Trans. Inf. Theory, 2012

A quantitative analysis of current security concerns and solutions for cloud computing.
J. Cloud Comput., 2012

Cryptanalysis of an efficient three-party password-based key exchange scheme.
Int. J. Commun. Syst., 2012

Flow-based Programming as a Solution for Cloud Computing Requirements.
Proceedings of the ICORES 2012, 2012

2011
One-time signature scheme from syndrome decoding over generic error-correcting codes.
J. Syst. Softw., 2011

EbitSim: An Enhanced BitTorrent Simulation Using OMNeT++ 4.
Proceedings of the MASCOTS 2011, 2011

Comparison of Authenticated-Encryption schemes in Wireless Sensor Networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

A Taxonomy Model for Cloud Computing Services.
Proceedings of the CLOSER 2011, 2011

2010
A Family of Implementation-Friendly BN Elliptic Curves.
IACR Cryptol. ePrint Arch., 2010

A survey on key management mechanisms for distributed Wireless Sensor Networks.
Comput. Networks, 2010

Implementation of data survival in unattended Wireless Sensor Networks using cryptography.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Revisiting the Security of the Alred Design.
Proceedings of the Information Security - 13th International Conference, 2010

Impact of Operating Systems on Wireless Sensor Networks (Security) Applications and Testbeds.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

An architecture for P2P locality in managed networks using hierarchical trackers.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
The MARVIN message authentication code and the LETTERSOUP authenticated encryption scheme.
Secur. Commun. Networks, 2009

Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
The CURUPIRA-2 Block Cipher for Constrained Platforms: Specification and Benchmarking.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008


  Loading...