Uma versão mais forte do algoritmo RC6 contra criptanálise χ2 ET Ueda, R Terada Anais do VII Simpósio Brasileiro em Segurança da Informação e de Sistemas …, 2007 | 10 | 2007 |
A systematic mapping on the role-permission relationship in role based access control models ET Ueda, WV Ruggiero IEEE Latin America Transactions 10 (1), 1243-1250, 2012 | 9 | 2012 |
A New Version of the RC6 Algorithm, Stronger against χ2 Cryptanalysis. R Terada, ET Ueda AISC, 47-52, 2009 | 5 | 2009 |
A Proposed Blockchain-Based Voting System with User Authentication through Biometrics ET Ueda, MM da Silva, AAA da Silva, NF Junior, FD Pereira, ... Journal of Information Security and Cryptography (Enigma) 8 (1), 1-11, 2021 | 3 | 2021 |
HAMRA—A middleware for data traffic management in public safety networks DA Merege, ET Ueda 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 464-469, 2018 | 3 | 2018 |
Analysis and handling of biased data provided by wireless sensor networks with lack of energy FL Vicente, AE Guelfi, AAA Silva, MT Azevedo, BE Luz, ET Ueda, ... International Journal of Sensor Networks 41 (3), 137-151, 2023 | 2 | 2023 |
Challenges and strategies for information systems in the decision-making process to face the COVID-19 pandemic: the São Paulo case AS Santos, IC Teixeira, R Neves, I Gonçales, A Inacio, ET Ueda, ... Trends and Applications in Information Systems and Technologies: Volume 3 9 …, 2021 | 2 | 2021 |
Análise de políticas de controle de acesso baseado em papéis com rede de Petri colorida. ET Ueda Universidade de São Paulo, 2019 | 2 | 2019 |
Modelling and verification of security rules in an openflow environment with coloured petri nets MAT Rojas, ET Ueda, TCM de Brito Carvalho 2014 9th Iberian Conference on Information Systems and Technologies (CISTI), 1-7, 2014 | 2 | 2014 |
The Challenge of e-Health Presence in a Petroleum Platform: A Contribution of Telemedicine to make the Operations of the Pre-Salt a Reality RN Ferreira, TL da Rosa, CB de Campos Lima, GBA de Lima, ... medicine 5, 1, 2015 | 1 | 2015 |
Vulnerability Detection in Intelligent Environments Authenticated by the OAuth 2.0 Protocol over HTTP/HTTPS G Da Silva Francisco, AAA da Silva, MT de Azevedo, ET Ueda, AE Guelfi, ... Int. J. Comput. Netw. Inf. Secur 16, 1-13, 2024 | | 2024 |
Minicursos do XXIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais AB Vieira, EF Silva, DSV de Medeiros, RSDS Araujo, T Paiva, V Ponciano, ... Sociedade Brasileira de Computação, 2023 | | 2023 |
Explorando esquemas criptográficos pós-quânticos considerados pelo NIST com implementação em Sage T Paiva, V Ponciano, E Moreira, R Oliveira, V Rufino, C Melo, J López, ... Sociedade Brasileira de Computação, 2023 | | 2023 |
Enhancement of DNSSec: Including Confidentiality to Name Resolution ET Ueda, MTM Vieira, AE Guelfi, AAA da Silva, MT de Azevedo, ... Journal of Information Security and Cryptography (Enigma) 7 (1), 8-19, 2020 | | 2020 |
Continuous authentication of users based on network usage behavior at corporate wireless local networks PLT de Moura, ET Ueda Brazilian Journal of Development 5 (7), 8436-8463, 2019 | | 2019 |
Implementation of a Single Sign-On Solution for Improved Password Management in Corporate Environments ET Ueda 14th CONTECSI-International Conference on Information Systems and Technology …, 2017 | | 2017 |
ENIGMA-Brazilian Journal of Information Security and Cryptography Volume 1 Issue 1 September 2014 ET Ueda, M Notare IEEE LATIN AMERICA TRANSACTIONS 13 (6), 1880-1881, 2015 | | 2015 |
Um mecanismo de detecção de fraudes de consumo de energia para Smart Grids utilizando a Teoria de Dempster-Shafer CP Niza, ET Ueda Anais SULCOMP 7, 2014 | | 2014 |
Fortalecimento do algoritmo RC6 contra criptanálise X2 ET Ueda Universidade de São Paulo, 2007 | | 2007 |
APLICAÇÃO DE ALGORITMOS DE APRENDIZADO DE MÁQUINA NA UNIFICAÇÃO DAS TÉCNICAS DE ANÁLISE ESTÁTICA E DINÂMICA NA CLASSIFICAÇÃO DE RANSOMWARE LRG de Oliveira, AAA da Silva, AE Guelfi, MT de Azevedo, EU Takeo, ... | | |