Michele Nogueira

Learn More
Since computer systems and communication become each time more pervasive, information security takes attention, requiring guarantees for data authentication, integrity and confidentiality. Pervasive communication and computer systems intend to provide access to information and services anytime and anywhere, demanding cryptographic systems more practical and(More)
The use of Wireless Sensor Networks (WSNs) has increased over the past years, supporting applications such as environmental monitoring, security systems, and multimedia streaming. These networks are characterized by a many-to-one traffic pattern. Hence, sensor nodes near to the sink have higher energy consumption, being prone to earlier deaths and failures.(More)
Wireless mesh networks (WMNs) support multimedia applications that claim for high level of security and performance simultaneously. However, wireless medium and multihop communication allow the action of attackers that can violate data packets or compromise the routing service, reducing performance and quality of service (QoS) of applications. Even in(More)
The characteristics of the Future Internet and the emerging technologies result in new requirements, in which user security issues are highlighted. Identity Management requirements are linked to the development of systems able to prevent unauthorized use of digital identities, information overload, and to enhance user privacy. This paper highlights the(More)
  • Michele Nogueira, Lima Eduardo, Da Silva, Aldri Luiz, Santos Luiz, Carlos P Albini +2 others
  • 2009
Resumo Cryptographic techniques are at the center of security solutions for wireless ad hoc networks. Public key infrastructures (PKIs) are essential for their efficient operation. However, the fully distributed organization of these networks makes a challenge to design PKIs. Changes in network paradigms and the increasing dependency on technology require(More)
  • 1