Francisco Rocha
Francisco Rocha
Postdoctoral scholar, The Pennsylvania State University
Verified email at psu.edu - Homepage
TitleCited byYear
Lucy in the sky without diamonds: Stealing confidential data in the cloud
F Rocha, M Correia
2011 IEEE/IFIP 41st International Conference on Dependable Systems and …, 2011
1792011
End-to-end reliability in wireless sensor networks: Survey and research challenges
PR Pereira, A Grilo, F Rocha, MS Nunes, A Casaca, C Chaudet, ...
EuroFGI Workshop on IP QoS and Traffic Control 54, 67-74, 2007
822007
The final frontier: Confidentiality and privacy in the cloud
F Rocha, S Abreu, M Correia
Computer 44 (9), 44-50, 2011
632011
Defense-in-depth Against Malicious Insiders in the Cloud
F Rocha, T Gross, A van Moorsel
IEEE International Conference on Cloud Engineering, 88 - 97, 2013
252013
Towards safe and secure autonomous and cooperative vehicle ecosystems
A Lima, F Rocha, M Völp, P Esteves-Veríssimo
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and …, 2016
192016
Performance evaluation of DTSN in wireless sensor networks
F Rocha, A Grilo, PR Pereira, MS Nunes, A Casaca
International Workshop of the EuroNGI Network of Excellence, 1-9, 2008
192008
Logging solutions to mitigate risks associated with threats in infrastructure as a service cloud
W Wongthai, F Rocha, A Van Moorsel
2013 International Conference on Cloud Computing and Big Data, 163-170, 2013
122013
A generic logging template for infrastructure as a service cloud
W Wongthai, FL Rocha, A van Moorsel
2013 27th International Conference on Advanced Information Networking and …, 2013
62013
Avoiding leakage and synchronization attacks through enclave-side preemption control
M Völp, A Lackorzynski, J Decouchant, V Rahli, F Rocha, ...
Proceedings of the 1st Workshop on System Software for Trusted Execution, 6, 2016
52016
Privacy in Cloud Computing
F Rocha
Carnegie Mellon University / University of Lisbon, 2010
32010
The Next Frontier: Managing Confidentiality and Integrity of Data in the Cloud
F Rocha, S Abreu, M Correia
IEEE Computer Society Press, 2013
22013
Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come (Transcript of Discussion)
M Völp
Cambridge International Workshop on Security Protocols, 238-246, 2017
12017
Meeting the challenges of critical and extreme dependability and security
P Esteves-Verissimo, M Völp, J Decouchant, V Rahli, F Rocha
2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing …, 2017
12017
A generic logging support architecture for infrastructure as a service (IaaS) cloud
W Wongthai, FL Rocha, AV Moorsel
School of Computing Science, 2012
12012
Experience Report: How to Design Web-Based Competitions for Legal Proceedings: Lessons from a Court Case
A van Moorsel, M Forshaw, F Rocha
2017 IEEE 28th International Symposium on Software Reliability Engineering …, 2017
2017
Insider threat: memory confidentiality and integrity in the cloud
F Rocha
Newcastle University, 2015
2015
Insider threat: memory confidentiality and integrity in the cloud
FE Liberal Rocha
Newcastle University, 2015
2015
Deconstructing MinBFT for Security and Verifiability
V Rahli, F Rocha, M Völp, P Esteves-Verissimo
Grand Region Security and Reliability Day, 0
The system can't perform the operation now. Try again later.
Articles 1–18