Follow
Newton Carlos Will
Title
Cited by
Cited by
Year
Systematic literature review on the use of trusted execution environments to protect cloud/fog-based internet of things applications
DCG Valadares, NC Will, J Caminha, MB Perkusich, A Perkusich, ...
IEEE Access 9, 80953-80969, 2021
232021
Using Intel SGX to protect authentication credentials in an untrusted operating system
RCR Condé, CA Maziero, NC Will
2018 IEEE Symposium on Computers and Communications (ISCC), 00158-00163, 2018
132018
A privacy-preserving data aggregation scheme for fog/cloud-enhanced iot applications using a trusted execution environment
NC Will
2022 IEEE International Systems Conference (SysCon), 1-5, 2022
122022
Confidential computing in cloud/fog-based Internet of Things scenarios
DCG Valadares, NC Will, MA Spohn, DF de Souza Santos, A Perkusich, ...
Internet of Things 19, 100543, 2022
112022
Trusted Execution Environments for Cloud/Fog-based Internet of Things Applications
DCG Valadares, NC Will, MA Spohn, DF de Souza Santos, A Perkusich, ...
11th International Conference on Cloud Computing and Services Science, 2021
112021
Comparative analysis between FFT and Kalman filter approaches for harmonic components detection
NC Will, R Cardoso
2012 10th IEEE/IAS International Conference on Industry Applications, 1-7, 2012
112012
Trusted Inter-Process Communication Using Hardware Enclaves
NC Will, T Heinrich, AB Viescinski, CA Maziero
15th Annual IEEE International Systems Conference, 2021
72021
Using a Shared SGX Enclave in the UNIX PAM Authentication Service
NC Will, CA Maziero
14th Annual IEEE International Systems Conference, 2020
72020
Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment
M da Rocha, DCG Valadares, A Perkusich, KC Gorgonio, RT Pagno, ...
10th International Conference on Cloud Computing and Services Science, 31-43, 2020
72020
Mecanismos de segurança baseados em hardware: uma introdução à arquitetura Intel SGX
NC Will, RCR Condé, CA Maziero
Minicursos [do] XVII Simpósio Brasileiro de Segurança da Informação e de …, 2017
72017
Implementation of the IEEE Std 1459-2010 using Kalman filter for fundamental and harmonics detection
NC Will, R Cardoso
2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), 1-7, 2012
72012
Security and Threats in the Brazilian e-Voting System: A Documentary Case Study Based on Public Security Tests
JI PEGORINI, ACC SOUZA, AR ORTONCELLI, RT PAGNO, NC WILL
14th International Conference on Theory and Practice of Electronic …, 2021
52021
Intel Software Guard Extensions Applications: A Survey
NC Will, CA Maziero
ACM Computing Surveys 55 (14s), 1-38, 2023
42023
Is it safe? identifying malicious apps through the use of metadata and inter-process communication
R Lemos, T Heinrich, CA Maziero, NC Will
2022 IEEE International Systems Conference (SysCon), 1-8, 2022
42022
Intel Software Guard Extensions in Internet of Things Scenarios: A Systematic Mapping Study
NC Will, DCG Valadares, DFS Santos, A Perkusich
8th International Conference on Future Internet of Things and Cloud, 2021
42021
Cross-platform virtual power analyzer based on IEEE standard 1459–2010
NC Will, L Santolin, R Cardoso
XI Brazilian Power Electronics Conference, 312-319, 2011
42011
Security Challenges and Recommendations in 5G-IoT Scenarios
DCG Valadares, NC Will, ÁÁCC Sobrinho, ACD Lima, IS Morais, ...
International Conference on Advanced Information Networking and Applications …, 2023
32023
Inspecting Binder transactions to detect anomalies in Android
RG Lemos, T Heinrich, NC Will, RR Obelheiro, CA Maziero
2023 IEEE International Systems Conference (SysCon), 1-8, 2023
22023
A Trusted Message Bus Built on Top of D-Bus
NC Will, T Heinrich, AB Viescinski, CA Maziero
XX Brazilian Symposium on Information and Computational Systems Security, 2020
22020
Uma Estratégia Dinâmica para a Detecção de Anomalias em Binários WebAssembly
C Helpa, T Heinrich, M Botacin, NC Will, RR Obelheiro, CA Maziero
Anais do XXIII Simpósio Brasileiro em Segurança da Informação e de Sistemas …, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20