


Остановите войну!
for scientists:


default search action
Newton Carlos Will
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c15]Dalton Cézane Gomes Valadares, Alvaro Sobrinho, Newton Carlos Will, Kyller Costa Gorgônio, Angelo Perkusich:
Trusted and only Trusted. That is the Access! - Improving Access Control Allowing only Trusted Execution Environment Applications. AINA (3) 2023: 490-503 - [c14]Dalton Cézane Gomes Valadares, Newton Carlos Will, Álvaro Alvares de Carvalho César Sobrinho, Anna C. D. Lima, Igor S. Morais, Danilo F. S. Santos:
Security Challenges and Recommendations in 5G-IoT Scenarios. AINA (1) 2023: 558-573 - 2022
- [j2]Dalton Cézane Gomes Valadares
, Newton Carlos Will, Marco Aurélio Spohn, Danilo Freire de Souza Santos, Angelo Perkusich, Kyller Costa Gorgônio:
Confidential computing in cloud/fog-based Internet of Things scenarios. Internet Things 19: 100543 (2022) - [c13]Tiago Heinrich
, Carlos Alberto Maziero, Newton Carlos Will, Rafael R. Obelheiro:
How DRDoS attacks vary across the globe? IMC 2022: 760-761 - [c12]Amanda B. Viescinski, Tiago Heinrich
, Newton Carlos Will, Carlos Maziero:
Behavior Modeling of a Distributed Application for Anomaly Detection. SECRYPT 2022: 333-340 - [c11]Rodrigo Lemos, Tiago Heinrich
, Carlos Alberto Maziero, Newton Carlos Will:
Is It Safe? Identifying Malicious Apps Through the Use of Metadata and Inter-Process Communication. SysCon 2022: 1-8 - [c10]Newton Carlos Will:
A Privacy-Preserving Data Aggregation Scheme for Fog/Cloud-Enhanced IoT Applications Using a Trusted Execution Environment. SysCon 2022: 1-5 - 2021
- [j1]Dalton Cézane Gomes Valadares
, Newton Carlos Will
, Jean Caminha, Mirko Barbosa Perkusich
, Angelo Perkusich
, Kyller Costa Gorgônio
:
Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things Applications. IEEE Access 9: 80953-80969 (2021) - [c9]Dalton Cézane Gomes Valadares, Newton Carlos Will, Marco Aurélio Spohn, Danilo Freire de Souza Santos
, Angelo Perkusich, Kyller Costa Gorgônio:
Trusted Execution Environments for Cloud/Fog-based Internet of Things Applications. CLOSER 2021: 111-121 - [c8]Newton Carlos Will, Dalton Cézane Gomes Valadares, Danilo Freire de Souza Santos
, Angelo Perkusich:
Intel Software Guard Extensions in Internet of Things Scenarios: A Systematic Mapping Study. FiCloud 2021: 342-349 - [c7]Jessica Iara Pegorini, Alinne Crintinne Corrêa Souza, André Roberto Ortoncelli, Rodrigo Tomaz Pagno, Newton Carlos Will:
Security and Threats in the Brazilian e-Voting System: A Documentary Case Study Based on Public Security Tests. ICEGOV 2021: 157-164 - [c6]Newton Carlos Will, Tiago Heinrich
, Amanda B. Viescinski, Carlos Alberto Maziero:
Trusted Inter-Process Communication Using Hardware Enclaves. SysCon 2021: 1-7 - 2020
- [c5]Marciano da Rocha
, Dalton Cézane Gomes Valadares
, Angelo Perkusich
, Kyller Costa Gorgônio
, Rodrigo Tomaz Pagno
, Newton Carlos Will
:
Trusted Client-Side Encryption for Cloud Storage. CLOSER (Selected Papers) 2020: 1-24 - [c4]Marciano da Rocha, Dalton Cézane Gomes Valadares, Angelo Perkusich
, Kyller Costa Gorgônio, Rodrigo Tomaz Pagno, Newton Carlos Will:
Secure Cloud Storage with Client-side Encryption using a Trusted Execution Environment. CLOSER 2020: 31-43 - [c3]Newton Carlos Will, Carlos Alberto Maziero:
Using a Shared SGX Enclave in the UNIX PAM Authentication Service. SysCon 2020: 1-7 - [i1]Marciano da Rocha, Dalton Cézane Gomes Valadares, Angelo Perkusich, Kyller Costa Gorgônio, Rodrigo Tomaz Pagno, Newton Carlos Will:
Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment. CoRR abs/2003.04163 (2020)
2010 – 2019
- 2018
- [c2]Rafael C. R. Conde, Carlos Alberto Maziero, Newton Carlos Will
:
Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System. ISCC 2018: 158-163 - 2012
- [c1]Newton Carlos Will, Rafael Cardoso
:
Implementation of the IEEE Std 1459-2010 using Kalman filter for fundamental and harmonics detection. ISGT Europe 2012: 1-7
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-25 23:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint