Jean Everson Martina
Cited by
Cited by
An updated threat model for security ceremonies
MC Carlos, JE Martina, G Price, RF Custódio
Proceedings of the 28th annual ACM symposium on applied computing, 1836-1843, 2013
OpenHSM: An open key life cycle protocol for public key infrastructure’s hardware security modules
JE Martina, TCS de Souza, RF Custodio
European Public Key Infrastructure Workshop, 220-235, 2007
Audit and backup procedures for hardware security modules
TCS de Souza, JE Martina, RF Custódio
Proceedings of the 7th Symposium on Identity and Trust on the Internet, 89-97, 2008
A Proposed Framework for Analysing Security Ceremonies.
MC Carlos, JE Martina, G Price, RF Custódio
SECRYPT, 440-445, 2012
Steganography in audio
N Jenkins, JE Martina
University of Cambridge CST Part II Dissertation, 2009
Blockchain and smart contracts for higher education registry in Brazil
LM Palma, MAG Vigil, FL Pereira, JE Martina
International Journal of Network Management 29 (3), e2061, 2019
Design and Large-scale Evaluation of Educational Games for Teaching Sorting Algorithms.
PE Battistella, CG Von Wangenheim, A Von Wangenheim, JE Martina
Informatics in Education 16 (2), 141-164, 2017
A Cross-layer Approach to Trustfulness in the Internet of Things
AA Fröhlich, AM Okazaki, RV Steiner, P Oliveira, JE Martina
16th IEEE International Symposium on Object/component/service-oriented Real …, 2013
Why should we analyse security ceremonies
JE Martina, MC Carlos
Proc. of CryptoForma, 2010
An adaptive threat model for security ceremonies
JE Martina, E Dos Santos, MC Carlos, G Price, RF Custódio
International Journal of Information Security 14 (2), 103-121, 2015
Verifying multicast-based security protocols using the inductive method
JE Martina, LC Paulson
International Journal of Information Security 14 (2), 187-204, 2015
Ceremonies formal analysis in pki's context
JE Martina, TCS de Souza, RF Custodio
2009 International Conference on Computational Science and Engineering 3 …, 2009
Projeto de um provedor de serviços criptográficos embarcado para infra-estrutura de chaves públicas e suas aplicações
JE Martina
Florianópolis, SC, 2005
Formal verification of a cross-layer, trustful space-time protocol for wireless sensor networks
DS Silva, D Resner, RL de Souza, JE Martina
International Conference on Information Systems Security, 426-443, 2016
Project of a hardware security module focused on public key infrastructures and its applications
JE Martina
Master's thesis, Federal University of Santa Catarina, 2005
Private verification of access on medical data: An initial study
TB Idalino, D Spagnuelo, JE Martina
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 86-103, 2017
A proposal for a unified identity card for use in an academic federation environment
FC Sasso, RAR De Moraes, JE Martina
2014 Ninth International Conference on Availability, Reliability and …, 2014
Steganographic message broadcasting using web protocols
R Duncan, JE Martina
proceedings of: Simposio Brasilerio de Seguranca (SBSeg 2010), Fortaleza …, 2010
Tuning the Winternitz hash-based digital signature scheme
LP Perin, G Zambonin, DMB Martins, R Custódio, JE Martina
2018 IEEE Symposium on Computers and Communications (ISCC), 00537-00542, 2018
A importância da inovação na gestão de processos administrativos da Universidade Pública, por meio da implementação da Tecnologia de Certificação Digital
FL Pereira, A de Linhares Jacobsen, JE Martina, FR Lengler
Revista da UNIFEBE 1 (21), 1-23, 2017
The system can't perform the operation now. Try again later.
Articles 1–20