All Stories

  1. Collecting, Processing and Secondary Using Personal and (Pseudo)Anonymized Data in Smart Cities
  2. Host-based IDS: A review and open issues of an anomaly detection system in IoT
  3. IoT security certifications: Challenges and potential approaches
  4. Threat Detection and Mitigation with Honeypots: A Modular Approach for IoT
  5. Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE
  6. The case for blockchain in IoT identity management
  7. Empowering Users Through a Privacy Middleware Watchdog
  8. pTASC
  9. Breaking MPC implementations through compression
  10. Secure Provisioning for Achieving End-to-End Secure Communications
  11. Evaluating the Privacy Properties of Secure VoIP Metadata
  12. FOSTERING EFFICIENT LEARNING IN THE TECHNICAL FIELD OF ROBOTICS BY CHANGING THE AUTONOMOUS DRIVING COMPETITION OF THE PORTUGUESE ROBOTICS OPEN
  13. The Present and Future of Privacy-Preserving Computation in Fog Computing
  14. Digital Signatures Workflows in Alfresco