Ricardo Macedo

Learn More
Keywords: Smart cities Heterogeneous wireless communication Architecture Low cost Interoperability a b s t r a c t Smart cities have become a reality around the world. They rely on wireless communication technologies, and they have provided many benefits to society, such as monitoring road traffic in real-time, giving continuous healthcare assistance to(More)
Cysticercosis is an endemic condition in many developing countries. Although it is the most common parasitic disease of the central nervous system, cysticercal involvement of the spinal cord is rare. It may occur as intradural extramedullary, intramedullary, intramedullary associated with intradural-extramedullary or as the vertebral presentation. We report(More)
Under the increasing popularization of portable and mobile devices, as well as the positive trends to the Internet of Everything, Identity Management systems gain a crucial role in integrating different administrative domains towards a global ubiquitous computing. Denial-of-Service (DoS) attacks can make IdM operations unavailable, preventing the use of(More)
Ensuring identity management (IdM) systems availability plays a key role to support networked systems. Denial-of-Service (DoS) attacks can make IdM operations unavailable, preventing the use of computational resources by legitimate users. In the literature, the main countermeasures against DoS over IdM systems are based on either the application of external(More)
The characteristics of the Future Internet and the emerging technologies result in new requirements, in which user security issues are highlighted. Identity Management requirements are linked to the development of systems able to prevent unauthorized use of digital identities, information overload, and to enhance user privacy. This paper highlights the(More)
Identity management (IdM) systems employ Identity Providers (IdPs), as guardians of users' critical information. However, Distributed Denial-of-Service (DDoS) attacks can make IdPs operations unavailable, compromising legitimate users. In the literature, the main countermeasures against DDoS attacks are based on either the application of external resources(More)
Vehicular ad hoc networks (VANETs) are envisioned to support Intelligent Transportation Systems, providing services to drivers. VANETs comprise of vehicles equipped with wireless communication devices, and access points spread over streets and roads. VANETs require multi-hop routing protocols to data tranmission, following two main approaches in relation to(More)
  • 1