Miguel L. Pardal
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
[c21]João M. P. Moreira, Helena Galhardas, Miguel L. Pardal:
LeanBench: comparing software stacks for batch and query processing of IoT data. ANT/SEIT 2018: 448-455
[c20]Marcus Gomes, Miguel L. Pardal:
Cloud vs Fog: assessment of alternative deployments for a latency-sensitive IoT application. ANT/SEIT 2018: 488-495
[c19]David R. Matos, Miguel L. Pardal, Pedro Adão, António Rito Silva
, Miguel P. Correia:
Securing Electronic Health Records in the Cloud. P2DS@EuroSys 2018: 1:1-1:6
[c18]David R. Matos, Miguel L. Pardal, Georg Carle, Miguel Correia:
RockFS: Cloud-backed File System Resilience to Client-Side Attacks. Middleware 2018: 107-119
[c17]Rui Claro
, José Portêlo
, Miguel L. Pardal
, Raquel Pinho
:
Big Data Privacy by Design Computation Platform. LOD 2018: 394-405
[c16]Diogo Calado, Miguel L. Pardal:
Tamper-Proof Incentive Scheme for Mobile Crowdsensing Systems. NCA 2018: 1-8
[c15]Joao Ferreira, Miguel L. Pardal:
Witness-Based Location Proofs for Mobile Devices. NCA 2018: 1-4
[c14]Filipe Apolinario, Miguel L. Pardal, Miguel P. Correia:
S-Audit: Efficient Data Integrity Verification for Cloud Storage. TrustCom/BigDataSE 2018: 465-474- 2017
[c13]David R. Matos, Miguel L. Pardal, Miguel Correia:
Rectify: black-box intrusion recovery in PaaS clouds. Middleware 2017: 209-221
[c12]André Joaquim, Miguel L. Pardal, Miguel Correia:
Vulnerability-Tolerant Transport Layer Security. OPODIS 2017: 28:1-28:16- 2016
[c11]Karan Balu, Miguel L. Pardal, Miguel Correia
:
DARSHANA: Detecting route hijacking for communication confidentiality. NCA 2016: 52-59
[c10]Diogo Raposo, Miguel L. Pardal, Luís E. T. Rodrigues, Miguel Correia
:
MACHETE: Multi-path communication for security. NCA 2016: 60-67
[c9]André Joaquim, Miguel L. Pardal, Miguel Correia:
vtTLS: A vulnerability-tolerant communication protocol. NCA 2016: 212-215- 2015
[i1]Miguel L. Pardal, José Alves Marques:
TrakChain Estimates Costs for Track and Trace in the Internet of (many) Things. ERCIM News 2015(101) (2015)- 2012
[c8]Miguel L. Pardal
, Mark Harrison, Sanjay E. Sarma, José Alves Marques:
Performance assessment of XACML authorizations for Supply Chain Traceability Web Services. CASoN 2012: 378-383
[c7]Miguel L. Pardal, Joana Paulo Pardal, José Alves Marques:
Performance Assessment of Web Services in the STEP Framework. CLOSER (Selected Papers) 2012: 200-214
[c6]Miguel L. Pardal, Joana Paulo Pardal, José Alves Marques:
Improving Web Services Performance, One Step at a Time. CLOSER 2012: 542-551
[c5]Miguel L. Pardal
, Mark Harrison, Sanjay E. Sarma, José Alves Marques:
Enforcing RFID data visibility restrictions using XACML security policies. RFID-TA 2012: 413-418- 2011
[c4]Miguel L. Pardal
, José Alves Marques:
Cost model for RFID-based traceability information systems. RFID-TA 2011: 486-493- 2010
[c3]João C. C. Leitão, Miguel L. Pardal
:
Smart Web Services: Systems' Integration Using Policy Driven Automatic Configuration. CENTERIS (2) 2010: 446-454
[c2]Miguel L. Pardal, José Alves Marques:
Towards the Internet of Things: An Introduction to RFID Technology. IWRT 2010: 69-78
[c1]Carlos Perdigão, Miguel L. Pardal:
EPC Virtual Lab: Experiments using an RFID Location Simulator. IWRT 2010: 107-112
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from
on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-01-24 03:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint



Google
Google Scholar
MS Academic
CiteSeerX
CORE
Semantic Scholar




