What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Miguel Correia
Google Scholar
22
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/dsn
Looking for Anomalies in Cross-Chain Bridges.
André Augusto
Rafael Belchior
Jonas Pfannschmidt
André Vasconcelos
Miguel Correia
2024
conf/sp
SoK: Security and Privacy of Blockchain Interoperability.
André Augusto
Rafael Belchior
Miguel Correia
André Vasconcelos
Luyao Zhang
Thomas Hardjono
2024
conf/icbc2
Multi-Party Cross-Chain Asset Transfers.
André Augusto
Rafael Belchior
André Vasconcelos
Miguel Correia
Thomas Hardjono
2023
journals/compsec
MultiTLS: using multiple and diverse ciphers for stronger secure channels.
Ricardo Moura
Ricardo Lopes
David R. Matos
Miguel L. Pardal
Miguel Correia
2023
conf/ccs
Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge.
Cláudio Correia
Miguel Correia
Luís E. T. Rodrigues
2023
conf/icbc2
CBDC Bridging between Hyperledger Fabric and Permissioned EVM-based Blockchains.
André Augusto
Rafael Belchior
Imre Kocsis
László Gönczy
André Vasconcelos
Miguel Correia
2023
conf/dsn
Automatic Generation of Distributed Algorithms with Generative AI.
Diogo Vaz
David R. Matos
Miguel L. Pardal
Miguel Correia
2022
conf/sec
Anonymous Trusted Data Relocation for TEEs.
Vasco Guita
Daniel Andrade
João Nuno Silva
Miguel Correia
2022
conf/esorics
ComSEC: Secure Communications for Baggage Handling Systems.
Filipe Apolinário
João Guiomar
Éric Hervé
Sven Hrastnik
Nelson Escravana
Miguel L. Pardal
Miguel Correia
2021
journals/istr
Secure cloud-of-clouds storage with space-efficient secret sharing.
Ahad Niknia
Miguel Correia
Jaber Karimpour
2020
conf/sec
MultiTLS: Secure Communication Channels with Cipher Suite Diversity.
Ricardo Moura
David R. Matos
Miguel L. Pardal
Miguel Correia
2020
conf/dsn
Omega: a Secure Event Ordering Service for the Edge.
Cláudio Correia
Miguel Correia
Luís Rodrigues
2017
conf/dsn
Demonstrating a Tool for Injection Attack Prevention in MySQL.
Iberia Medeiros
Miguel Beatriz
Nuno Ferreira Neves
Miguel Correia
2016
conf/dsn
Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report.
Iberia Medeiros
Nuno Ferreira Neves
Miguel Correia
2011
conf/dsn
Lucy in the sky without diamonds: Stealing confidential data in the cloud.
Francisco Rocha
Miguel Correia
2011
conf/dsn
Anomaly-based intrusion detection in software as a service.
Gustavo Nascimento
Miguel Correia
2010
conf/dsn
Turquois: Byzantine consensus in wireless ad hoc networks.
Henrique Moniz
Nuno Ferreira Neves
Miguel Correia
2010
conf/dsn
4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010.
Miguel Correia
Partha P. Pal
2009
conf/dsn
3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009.
Saurabh Bagchi
Miguel Correia
Partha P. Pal
2009
conf/dsn
Intrusion-tolerant self-healing devices for critical infrastructure protection.
Paulo Sousa
Alysson Neves Bessani
Wagner Saback Dantas
Fabio Souto
Miguel Correia
Nuno Ferreira Neves
2006
conf/dsn
Randomized Intrusion-Tolerant Asynchronous Services.
Henrique Moniz
Nuno Ferreira Neves
Miguel Correia
Paulo Veríssimo
2006
conf/dsn
Using Attack Injection to Discover New Vulnerabilities.
Nuno Ferreira Neves
João Antunes
Miguel Correia
Paulo Veríssimo
Rui Ferreira Neves
Coauthors
Ahad Niknia
(1)
Alysson Neves Bessani
(1)
André Augusto
(4)
André Vasconcelos
(4)
Cláudio Correia
(2)
Daniel Andrade
(1)
David R. Matos
(3)
Diogo Vaz
(1)
Éric Hervé
(1)
Fabio Souto
(1)
Filipe Apolinário
(1)
Francisco Rocha
(1)
Gustavo Nascimento
(1)
Henrique Moniz
(2)
Ibéria Medeiros
(2)
Imre Kocsis
(1)
Jaber Karimpour
(1)
João Antunes
(1)
João Guiomar
(1)
João Nuno Silva
(1)
Jonas Pfannschmidt
(1)
László Gönczy
(1)
Luís E. T. Rodrigues
(1)
Luís Rodrigues
(1)
Luyao Zhang
(1)
Miguel Beatriz
(1)
Miguel Correia
(22)
Miguel L. Pardal
(4)
Nelson Escravana
(1)
Nuno Ferreira Neves
(6)
Partha P. Pal
(2)
Paulo Sousa
(1)
Paulo Veríssimo
(2)
Rafael Belchior
(4)
Ricardo Lopes
(1)
Ricardo Moura
(2)
Rui Ferreira Neves
(1)
Saurabh Bagchi
(1)
Sven Hrastnik
(1)
Thomas Hardjono
(2)
Vasco Guita
(1)
Wagner Saback Dantas
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to