Danilo Valeros Bernardo

Learn More
Network protocols do not solely rely on the lower layers of the stack for security. Many of these protocols rely on a combination of layers to develop a more secure channel for data transmission. UDT, like other new next generation high speed protocols, relies on Transport, on IP, and on Network layers for data delivery and protection. However, like other(More)
Various technologies have emerged since the Internet protocols were first introduced. Many of these technologies were compellingly complex to implement that it was thought that the existing Internet would have to be redesigned in order to accommodate them. While these proved to be false, security, however, remains to be a major challenge that current and(More)
This paper evaluates security issues of the recently designed and implemented next generation protocol UDTv4 and offers two contributions to this area of research. Firstly, since UDT is a relatively new protocol, its security requirements have not been considered and explored. An examination investigating its security requirements in implementation is(More)
Requirements sometimes can turn out to be either incomplete or inconsistent. Factors contributing to this situation include the selection of the elicitation technique and other approaches used. Some approaches used for requirements gathering such as single elicitation approach, and their effects during requirements elicitation, can cause deficiency in many(More)
Understanding the peopling of the Americas remains an important and challenging question. Here, we present (14)C dates, and morphological, isotopic and genomic sequence data from two human skulls from the state of Minas Gerais, Brazil, part of one of the indigenous groups known as 'Botocudos'. We find that their genomic ancestry is Polynesian, with no(More)
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these protocols are TCP protocol variants, which have demonstrated better performance in simulation and several limited network experiments but have limited practical applications because of(More)