default search action
Paulo Veríssimo
Person information
- affiliation: University of Lisbon, Faculty of Sciences
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c120]Xingyu Su, Xiaojie Zhu, Yang Li, Yong Li, Chi Chen, Paulo Jorge Esteves Veríssimo:
PagPassGPT: Pattern Guided Password Guessing via Generative Pretrained Transformer. DSN 2024: 429-442 - [i28]Ali Shoker, Rehana Yasmin, Paulo Esteves Veríssimo:
Savvy: Trustworthy Autonomous Vehicles Architecture. CoRR abs/2402.14580 (2024) - [i27]Houzhe Wang, Xiaojie Zhu, Chi Chen, Paulo Esteves Veríssimo:
Goldfish: An Efficient Federated Unlearning Framework. CoRR abs/2404.03180 (2024) - [i26]Xingyu Su, Xiaojie Zhu, Yang Li, Yong Li, Chi Chen, Paulo Esteves Veríssimo:
PagPassGPT: Pattern Guided Password Guessing via Generative Pretrained Transformer. CoRR abs/2404.04886 (2024) - [i25]Inês Pinto Gouveia, Ahmad T. Sheikh, Ali Shoker, Suhaib A. Fahmy, Paulo Jorge Esteves Veríssimo:
Resilient and Secure Programmable System-on-Chip Accelerator Offload. CoRR abs/2406.18117 (2024) - [i24]Ahmad T. Sheikh, Ali Shoker, Suhaib A. Fahmy, Paulo Jorge Esteves Veríssimo:
ResiLogic: Leveraging Composability and Diversity to Design Fault and Intrusion Resilient Chips. CoRR abs/2409.02553 (2024) - 2023
- [c119]Iliès Benhabbour, Yérom-David Bromberg, Marc Dacier, Sven Dietrich, Rodrigo Seromenho Miragaia Rodrigues, Paulo Esteves Veríssimo:
Attacks on tomorrow's virtual world. DSN-S 2023: 105-110 - [c118]Ali Shoker, Paulo Esteves Veríssimo, Marcus Völp:
The Path to Fault- and Intrusion-Resilient Manycore Systems on a Chip. DSN-S 2023: 157-162 - [c117]Ahmad Tariq Sheikh, Ali Shoker, Paulo Esteves Veríssimo:
Resilient and Secure System on Chip with Rejuvenation in the Wake of Persistent Attacks. EuroSec@EUROSYS 2023: 37-43 - [c116]Ali Shoker, Fernando Alves, Paulo Esteves Veríssimo:
ScaIOTA: Scalable Secure Over-the-Air Software Updates for Vehicles. SRDS 2023: 151-161 - [c115]Ali Shoker, Vincent Rahli, Jérémie Decouchant, Paulo Esteves Veríssimo:
Intrusion Resilience Systems for Modern Vehicles. VTC2023-Spring 2023: 1-7 - [i23]Ahmad T. Sheikh, Ali Shoker, Paulo Esteves Veríssimo:
System on Chip Rejuvenation in the Wake of Persistent Attacks. CoRR abs/2301.08018 (2023) - [i22]Ali Shoker, Paulo Esteves Veríssimo, Marcus Völp:
The Path to Fault- and Intrusion-Resilient Manycore Systems on a Chip. CoRR abs/2307.01783 (2023) - [i21]Ali Shoker, Fernando Alves, Paulo Esteves Veríssimo:
ScalOTA: Scalable Secure Over-the-Air Software Updates for Vehicles. CoRR abs/2307.02032 (2023) - [i20]Ali Shoker, Vincent Rahli, Jeremie Decouchant, Paulo Esteves Veríssimo:
Intrusion Resilience Systems for Modern Vehicles. CoRR abs/2307.04184 (2023) - [i19]Alysson Bessani, Miguel Correia, Tobias Distler, Rüdiger Kapitza, Paulo Esteves Veríssimo, Jiangshan Yu:
Vivisecting the Dissection: On the Role of Trusted Components in BFT Protocols. CoRR abs/2312.05714 (2023) - 2022
- [j42]Inês Pinto Gouveia, Marcus Völp, Paulo Esteves Veríssimo:
Behind the last line of defense: Surviving SoC faults and intrusions. Comput. Secur. 123: 102920 (2022) - 2021
- [j41]Túlio A. Pascoal, Jérémie Decouchant, Antoine Boutet, Paulo Jorge Esteves Veríssimo:
DyPS: Dynamic, Private and Secure GWAS. Proc. Priv. Enhancing Technol. 2021(2): 214-234 (2021) - [j40]David Kozhaya, Jérémie Decouchant, Vincent Rahli, Paulo Esteves Veríssimo:
PISTIS: An Event-Triggered Real-Time Byzantine-Resilient Protocol Suite. IEEE Trans. Parallel Distributed Syst. 32(9): 2277-2290 (2021) - [c114]Douglas Simões Silva, Rafal Graczyk, Jérémie Decouchant, Marcus Völp, Paulo Esteves Veríssimo:
Threat Adaptive Byzantine Fault Tolerant State-Machine Replication. SRDS 2021: 78-87 - [c113]Tong Cao, Jérémie Decouchant, Jiangshan Yu, Paulo Esteves Veríssimo:
Characterizing the Impact of Network Delay on Bitcoin Mining. SRDS 2021: 109-119 - [i18]Rafal Graczyk, Marcus Völp, Paulo Jorge Esteves Veríssimo:
EphemeriShield - defence against cyber-antisatellite weapons. CoRR abs/2101.12620 (2021) - [i17]Charalambos Konstantinou, George Stergiopoulos, Masood Parvania, Paulo Esteves Veríssimo:
Chaos Engineering for Enhanced Resilience of Cyber-Physical Systems. CoRR abs/2106.14962 (2021) - [i16]Rafal Graczyk, Paulo Esteves Veríssimo, Marcus Völp:
Sanctuary lost: a cyber-physical warfare in space. CoRR abs/2110.05878 (2021) - [i15]Runchao Han, Jiangshan Yu, Haoyu Lin, Shiping Chen, Paulo Jorge Esteves Veríssimo:
On the Security and Performance of Blockchain Sharding. IACR Cryptol. ePrint Arch. 2021: 1276 (2021) - 2020
- [j39]Maria Fernandes, Jérémie Decouchant, Marcus Völp, Francisco M. Couto, Paulo Jorge Esteves Veríssimo:
DNA-SeAl: Sensitivity Levels to Optimize the Performance of Privacy-Preserving DNA Alignment. IEEE J. Biomed. Health Informatics 24(3): 907-915 (2020) - [c112]Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Veríssimo:
Exploring the Monero Peer-to-Peer Network. Financial Cryptography 2020: 578-594 - [i14]Inês Pinto Gouveia, Marcus Völp, Paulo Jorge Esteves Veríssimo:
Behind the Last Line of Defense - Surviving SoC Faults and Intrusions. CoRR abs/2005.04096 (2020) - [i13]Paulo Jorge Esteves Veríssimo, Jérémie Decouchant, Marcus Völp, Alireza Esfahani, Rafal Graczyk:
PriLok: Citizen-protecting distributed epidemic tracing. CoRR abs/2005.04519 (2020) - [i12]David Kozhaya, Jeremie Decouchant, Vincent Rahli, Paulo Jorge Esteves Veríssimo:
PISTIS: From a Word-of-Mouth to a Gentleman's Agreement. CoRR abs/2007.10958 (2020)
2010 – 2019
- 2019
- [j38]Antônio Augusto Fröhlich, Roberto Milton Scheffel, David Kozhaya, Paulo Jorge Esteves Veríssimo:
Byzantine Resilient Protocol for the IoT. IEEE Internet Things J. 6(2): 2506-2517 (2019) - [j37]Ivana Vukotic, Vincent Rahli, Paulo Jorge Esteves Veríssimo:
Asphalion: trustworthy shielding against Byzantine faults. Proc. ACM Program. Lang. 3(OOPSLA): 138:1-138:32 (2019) - [j36]David Kozhaya, Jeremie Decouchant, Paulo Jorge Esteves Veríssimo:
RT-ByzCast: Byzantine-Resilient Real-Time Reliable Broadcast. IEEE Trans. Computers 68(3): 440-454 (2019) - [j35]Jiangshan Yu, David Kozhaya, Jeremie Decouchant, Paulo Jorge Esteves Veríssimo:
RepuCoin: Your Reputation Is Your Power. IEEE Trans. Computers 68(8): 1225-1237 (2019) - [j34]Diego Kreutz, Jiangshan Yu, Fernando M. V. Ramos, Paulo Jorge Esteves Veríssimo:
ANCHOR: Logically Centralized Security for Software-Defined Networks. ACM Trans. Priv. Secur. 22(2): 8:1-8:36 (2019) - [c111]Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo:
Re-Thinking Untraceability in the CryptoNote-Style Blockchain. CSF 2019: 94-107 - [c110]Andrew Paverd, Marcus Völp, Ferdinand Brasser, Matthias Schunter, N. Asokan, Ahmad-Reza Sadeghi, Paulo Jorge Esteves Veríssimo, Andreas Steininger, Thorsten Holz:
Sustainable Security & Safety: Challenges and Opportunities. CERTS 2019: 4:1-4:13 - [c109]Jérémie Decouchant, Antoine Boutet, Jiangshan Yu, Paulo Jorge Esteves Veríssimo:
P3LS: Plausible Deniability for Practical Privacy-Preserving Live Streaming. SRDS 2019: 1-10 - [i11]Christopher Natoli, Jiangshan Yu, Vincent Gramoli, Paulo Jorge Esteves Veríssimo:
Deconstructing Blockchains: A Comprehensive Survey on Consensus, Membership and Structure. CoRR abs/1908.08316 (2019) - [i10]Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo:
Re-thinking untraceability in the CryptoNote-style blockchain. IACR Cryptol. ePrint Arch. 2019: 186 (2019) - [i9]Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Veríssimo:
Exploring the Monero Peer-to-Peer Network. IACR Cryptol. ePrint Arch. 2019: 411 (2019) - 2018
- [j33]Diego Kreutz, Jiangshan Yu, Paulo Jorge Esteves Veríssimo, Catia Magalhaes, Fernando M. V. Ramos:
The KISS Principle in Software-Defined Networking: A Framework for Secure Communications. IEEE Secur. Priv. 16(5): 60-70 (2018) - [j32]Jérémie Decouchant, Maria Fernandes, Marcus Völp, Francisco M. Couto, Paulo Jorge Esteves Veríssimo:
Accurate filtering of privacy-sensitive information in raw genomic data. J. Biomed. Informatics 82: 1-12 (2018) - [c108]Vincent Rahli, Ivana Vukotic, Marcus Völp, Paulo Jorge Esteves Veríssimo:
Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq. ESOP 2018: 619-650 - [c107]Marcus Völp, Paulo Jorge Esteves Veríssimo:
Intrusion-Tolerant Autonomous Driving. ISORC 2018: 130-133 - [c106]Kristin Krüger, Gerhard Fohler, Marcus Völp, Paulo Jorge Esteves Veríssimo:
Improving Security for Time-Triggered Real-Time Systems with Task Replication. RTCSA 2018: 232-233 - [c105]Christoph Lambert, Maria Fernandes, Jeremie Decouchant, Paulo Jorge Esteves Veríssimo:
MaskAl: Privacy Preserving Masked Reads Alignment using Intel SGX. SRDS 2018: 113-122 - [c104]Christoph Lambert, Marcus Völp, Jeremie Decouchant, Paulo Jorge Esteves Veríssimo:
Towards Real-Time-Aware Intrusion Tolerance. SRDS 2018: 269-270 - [i8]David Kozhaya, Jérémie Decouchant, Paulo Jorge Esteves Veríssimo:
RT-ByzCast: Byzantine-Resilient Real-Time Reliable Broadcast. CoRR abs/1807.01226 (2018) - [i7]Jiangshan Yu, David Kozhaya, Jérémie Decouchant, Paulo Jorge Esteves Veríssimo:
RepuCoin: Your Reputation is Your Power. IACR Cryptol. ePrint Arch. 2018: 239 (2018) - 2017
- [c103]Vinicius Vielmo Cogo, Alysson Bessani, Francisco M. Couto, Margarida Gama-Carvalho, Maria Fernandes, Paulo Jorge Esteves Veríssimo:
How Can Photo Sharing Inspire Sharing Genomes? PACBB 2017: 74-82 - [c102]Maria Fernandes, Jérémie Decouchant, Francisco M. Couto, Paulo Jorge Esteves Veríssimo:
Cloud-Assisted Read Alignment and Privacy. PACBB 2017: 220-227 - [c101]Paulo Jorge Esteves Veríssimo, Marcus Völp, Jeremie Decouchant, Vincent Rahli, Francisco Rocha:
Meeting the Challenges of Critical and Extreme Dependability and Security. PRDC 2017: 92-97 - [c100]Gary Cornelius, Patrice Caire, Nico Hochgeschwender, Miguel A. Olivares-Méndez, Paulo Jorge Esteves Veríssimo, Marcus Völp, Holger Voos:
A Perspective of Security for Mobile Service Robots. ROBOT (1) 2017: 88-100 - [c99]Marcus Völp, Jérémie Decouchant, Christoph Lambert, Maria Fernandes, Paulo Jorge Esteves Veríssimo:
Enclave-Based Privacy-Preserving Alignment of Raw Genomic Information: Information Leakage and Countermeasures. SysTEX@SOSP 2017: 7:1-7:6 - [c98]Marcus Völp, Francisco Rocha, Jeremie Decouchant, Jiangshan Yu, Paulo Jorge Esteves Veríssimo:
Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come. Security Protocols Workshop 2017: 232-237 - [i6]Diego Kreutz, Paulo Jorge Esteves Veríssimo, Catia Magalhaes, Fernando M. V. Ramos:
The KISS principle in Software-Defined Networking: An architecture for Keeping It Simple and Secure. CoRR abs/1702.04294 (2017) - [i5]Diego Kreutz, Jiangshan Yu, Fernando M. V. Ramos, Paulo Jorge Esteves Veríssimo:
ANCHOR: logically-centralized security for Software-Defined Networks. CoRR abs/1711.03636 (2017) - 2016
- [j31]Alysson Bessani, Nuno Ferreira Neves, Paulo Veríssimo, Wagner Saback Dantas, Alexandre Fonseca, Rui Silva, Pedro Luz, Miguel Correia:
JITeR: Just-in-time application-layer routing. Comput. Networks 104: 122-136 (2016) - [c97]Antonio Lima, Francisco Rocha, Marcus Völp, Paulo Jorge Esteves Veríssimo:
Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems. CPS-SPC@CCS 2016: 59-70 - [c96]Marcus Völp, Adam Lackorzynski, Jérémie Decouchant, Vincent Rahli, Francisco Rocha, Paulo Jorge Esteves Veríssimo:
Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control. SysTEX@Middleware 2016: 6:1-6:6 - 2015
- [j30]Diego Kreutz, Fernando M. V. Ramos, Paulo Jorge Esteves Veríssimo, Christian Esteve Rothenberg, Siamak Azodolmolky, Steve Uhlig:
Software-Defined Networking: A Comprehensive Survey. Proc. IEEE 103(1): 14-76 (2015) - [c95]Paulo Jorge Esteves Veríssimo:
MB4CP 2015 Keynote II: Resilience of Cyber-Physical Energy Systems. DSN Workshops 2015: 3 - [c94]Paulo Veríssimo:
SSIV 2015 Keynote II: From Embedded Systems to Autonomous Cooperating Objects. DSN Workshops 2015: 124 - [c93]Vinicius Vielmo Cogo, Alysson Bessani, Francisco M. Couto, Paulo Veríssimo:
A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data. WPES@CCS 2015: 101-110 - 2014
- [c92]Alysson Neves Bessani, Ricardo Mendes, Tiago Oliveira, Nuno Ferreira Neves, Miguel Correia, Marcelo Pasin, Paulo Veríssimo:
SCFS: A Shared Cloud-backed File System. USENIX ATC 2014: 169-180 - [i4]Diego Kreutz, Fernando M. V. Ramos, Paulo Veríssimo, Christian Esteve Rothenberg, Siamak Azodolmolky, Steve Uhlig:
Software-Defined Networking: A Comprehensive Survey. CoRR abs/1406.0440 (2014) - 2013
- [j29]Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
BFT-TO: Intrusion Tolerance with Less Replicas. Comput. J. 56(6): 693-715 (2013) - [j28]Paulo Jorge Esteves Veríssimo, Alysson Neves Bessani:
E-biobanking: What Have You Done to My Cell Samples? IEEE Secur. Priv. 11(6): 62-65 (2013) - [j27]Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, Paulo Veríssimo:
Efficient Byzantine Fault-Tolerance. IEEE Trans. Computers 62(1): 16-30 (2013) - [c91]Jogesh K. Muppala, Matti A. Hiltunen, Roy H. Campbell, Paulo Veríssimo:
The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology DCDV 2013. DSN 2013: 1-2 - [c90]Rolando Martins, Rajeev Gandhi, Priya Narasimhan, Soila M. Pertet, António Casimiro, Diego Kreutz, Paulo Veríssimo:
Experiences with Fault-Injection in a Byzantine Fault-Tolerant Protocol. Middleware 2013: 41-61 - [c89]Diego Kreutz, Fernando M. V. Ramos, Paulo Veríssimo:
Towards secure and dependable software-defined networks. HotSDN 2013: 55-60 - [i3]Francisco M. Couto, Daniel Faria, Bruno Tavares, Pedro Gonçalves, Paulo Veríssimo:
Benchmarking some Portuguese S&T system research units. CoRR abs/1302.0420 (2013) - 2012
- [j26]Monica Dixit, António Casimiro, Paolo Lollini, Andrea Bondavalli, Paulo Veríssimo:
Adaptare: Supporting automatic and dependable adaptation in dynamic environments. ACM Trans. Auton. Adapt. Syst. 7(2): 18:1-18:25 (2012) - [c88]António Casimiro, Paulo Veríssimo, Diego Kreutz, Filipe Araújo, Raul Barbosa, Samuel Neves, Bruno Sousa, Marília Curado, Carlos Silva, Rajeev Gandhi, Priya Narasimhan:
TRONE: Trustworthy and Resilient Operations in a Network Environment. DSN Workshops 2012: 1-6 - [c87]Paulo Veríssimo, Alysson Neves Bessani, Marcelo Pasin:
The TClouds architecture: Open and resilient cloud-of-clouds computing. DSN Workshops 2012: 1-6 - [c86]Miguel Correia, Pedro A. R. S. Costa, Marcelo Pasin, Alysson Neves Bessani, Fernando M. V. Ramos, Paulo Veríssimo:
On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds. SRDS 2012: 448-453 - [i2]Giovanna Dondossola, Geert Deconinck, Felicita Di Giandomenico, Susanna Donatelli, Mohamed Kaâniche, Paulo Veríssimo:
Critical Utility Infrastructural Resilience. CoRR abs/1211.5736 (2012) - [i1]Rüdiger Kapitza, Matthias Schunter, Marc Shapiro, Paulo Veríssimo, Michael Waidner:
Security and Dependability for Federated Cloud Platforms (Dagstuhl Seminar 12281). Dagstuhl Reports 2(7): 56-72 (2012) - 2011
- [j25]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo:
Randomization can be a healer: consensus with dynamic omission failures. Distributed Comput. 24(3-4): 165-175 (2011) - [j24]Miguel Correia, Giuliana Santos Veronese, Nuno Ferreira Neves, Paulo Veríssimo:
Byzantine consensus in asynchronous message-passing systems: a survey. Int. J. Crit. Comput. Based Syst. 2(2): 141-161 (2011) - [j23]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo:
RITAS: Services for Randomized Intrusion Tolerance. IEEE Trans. Dependable Secur. Comput. 8(1): 122-136 (2011) - [c85]Bernhard Kauer, Paulo Veríssimo, Alysson Neves Bessani:
Recursive virtual machines for advanced security mechanisms. DSN Workshops 2011: 117-122 - [c84]José Rufino, Paulo Veríssimo, Ricardo Pinto, Carlos Almeida, Guilherme Arroz:
Enforcing Dependability and Timeliness in CANELy - Application to Spaceborne Data Communication Systems. PECCS 2011: 456-463 - [c83]João Antunes, Nuno Ferreira Neves, Paulo Veríssimo:
Reverse Engineering of Protocols from Network Traces. WCRE 2011: 169-178 - 2010
- [j22]Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Trans. Parallel Distributed Syst. 21(4): 452-465 (2010) - [j21]João Antunes, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo, Rui Ferreira Neves:
Vulnerability Discovery with Attack Injection. IEEE Trans. Software Eng. 36(3): 357-370 (2010) - [c82]Carlos Silva, Paulo Sousa, Paulo Veríssimo:
RAVE: Replicated antivirus engine. DSN Workshops 2010: 170-175 - [c81]José Rufino, João Craveiro, Paulo Veríssimo:
Building a Time- and Space-Partitioned Architecture for the Next Generation of Space Vehicle Avionics. SEUS 2010: 179-190 - [c80]Paulo Veríssimo:
Security Made, Not Perfect, But Automatic. Security Protocols Workshop 2010: 217-223 - [c79]Paulo Veríssimo:
Security Made, Not Perfect, But Automatic (Transcript of Discussion). Security Protocols Workshop 2010: 224-232 - [e1]Paulo Veríssimo, Hakim Weatherspoon:
Proceedings of the Sixth Workshop on Hot Topics in System Dependability, HotDep 2010, Vancouver, BC, Canada, October 3, 2010. USENIX Association 2010 [contents]
2000 – 2009
- 2009
- [c78]Paulo Veríssimo, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa:
Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned. HICSS 2009: 1-8 - [c77]José Rufino, João Craveiro, Paulo Veríssimo:
Architecting Robustness and Timeliness in a New Generation of Aerospace Systems. WADS 2009: 146-170 - [c76]António Casimiro, José Rufino, Luis Marques, Mario Calha, Paulo Veríssimo:
Applying Architectural Hybridization in Networked Embedded Systems. SEUS 2009: 264-275 - [c75]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo:
Randomization Can Be a Healer: Consensus with Dynamic Omission Failures. DISC 2009: 63-77 - 2008
- [j20]Steven M. Bellovin, Terry V. Benzel, Bob Blakley, Dorothy E. Denning, Whitfield Diffie, Jeremy Epstein, Paulo Veríssimo:
Information Assurance Technology Forecast 2008. IEEE Secur. Priv. 6(1): 16-23 (2008) - [j19]Alysson Neves Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
The Crutial Way of Critical Infrastructure Protection. IEEE Secur. Priv. 6(6): 44-51 (2008) - [j18]Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia:
The CRUTIAL reference critical information infrastructure architecture: a blueprint. Int. J. Syst. Syst. Eng. 1(1/2): 78-95 (2008) - [j17]Miguel Correia, Alysson Neves Bessani, Paulo Veríssimo:
On Byzantine generals with alternative plans. J. Parallel Distributed Comput. 68(9): 1291-1296 (2008) - [c74]João Antunes, Nuno Ferreira Neves, Paulo Veríssimo:
Detection and Prediction of Resource-Exhaustion Vulnerabilities. ISSRE 2008: 87-96 - [c73]Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Paulo Veríssimo:
Finite Memory: A Vulnerability of Intrusion-Tolerant Systems. NCA 2008: 37-44 - [c72]António Casimiro, Paolo Lollini, Monica Dixit, Andrea Bondavalli, Paulo Veríssimo:
A framework for dependable QoS adaptation in probabilistic environments. SAC 2008: 2192-2196 - 2007
- [j16]Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo:
Worm-IT - A wormhole-based intrusion-tolerant group communication system. J. Syst. Softw. 80(2): 178-197 (2007) - [j15]Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel P. Correia, Paulo Veríssimo:
Automated Rule-Based Diagnosis through a Distributed Monitor System. IEEE Trans. Dependable Secur. Comput. 4(4): 266-279 (2007) - [c71]Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, Anas Abou El Kalam, Andrea Bondavalli, Alessandro Daidone:
The CRUTIAL Architecture for Critical Information Infrastructures. WADS 2007: 1-27 - [c70]Alessandro Daidone, Silvano Chiaradonna, Andrea Bondavalli, Paulo Veríssimo:
Analysis of a Redundant Architecture for Critical Infrastructure Protection. WADS 2007: 78-100 - [c69]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Veríssimo:
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. PRDC 2007: 357-364 - [c68]Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
Resilient Intrusion Tolerance through Proactive and Reactive Recovery. PRDC 2007: 373-380 - [c67]Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Paulo Veríssimo:
On the Effects of Finite Memory on Intrusion-Tolerant Systems. PRDC 2007: 401-404 - [c66]Hugo Ortiz, António Casimiro, Paulo Veríssimo:
Architecture and Implementation of an Embedded Wormhole. SIES 2007: 341-344 - [c65]Alysson Neves Bessani, Miguel Correia, Henrique Moniz, Nuno Ferreira Neves, Paulo Veríssimo:
When 3f+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus. DISC 2007: 480-481 - 2006
- [j14]Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures. Comput. J. 49(1): 82-96 (2006) - [j13]Paulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch:
Intrusion-tolerant middleware: the road to automatic security. IEEE Secur. Priv. 4(4): 54-62 (2006) - [j12]Paulo Veríssimo:
Travelling through wormholes: a new look at distributed systems models. SIGACT News 37(1): 66-81 (2006) - [j11]Jean Arlat, Andrea Bondavalli, Boudewijn R. Haverkort, Paulo Veríssimo:
Guest Editorial for the Special Issue on the 2005 IEEE/IFIP Conference on Dependable Systems and Networks, including the Dependable Computing and Communications and Performance and Dependability Symposia. IEEE Trans. Dependable Secur. Comput. 3(3): 169-171 (2006) - [c64]Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia:
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture. CRITIS 2006: 1-14 - [c63]Nuno Ferreira Neves, João Antunes, Miguel Correia, Paulo Veríssimo, Rui Ferreira Neves:
Using Attack Injection to Discover New Vulnerabilities. DSN 2006: 457-466 - [c62]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo:
Randomized Intrusion-Tolerant Asynchronous Services. DSN 2006: 568-577 - [c61]José Rufino, Paulo Veríssimo, Carlos Almeida, Guilherme Arroz:
Integrating Inaccessibility Control and Timer Management in CANELy. ETFA 2006: 348-355 - [c60]Paulo Veríssimo:
Thou Shalt Not Trust non-Trustworthy Systems. ICDCS Workshops 2006 - [c59]António Casimiro, Jörg Kaiser, Paulo Veríssimo:
Generic-Events Architecture: Integrating Real-World Aspects in Event-Based Systems. WADS 2006: 287-315 - [c58]Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo:
Proactive resilience through architectural hybridization. SAC 2006: 686-690 - [c57]Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo, William H. Sanders:
Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available. SRDS 2006: 71-82 - [c56]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo:
Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols. SRDS 2006: 235-244 - 2005
- [j10]Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo:
Low complexity Byzantine-resilient consensus. Distributed Comput. 17(3): 237-249 (2005) - [j9]Pedro Martins, Paulo Sousa, António Casimiro, Paulo Veríssimo:
A New Programming Model for Dependable Adaptive Real-Time Applications. IEEE Distributed Syst. Online 6(5) (2005) - [j8]Paul Caspi, Alberto L. Sangiovanni-Vincentelli, Luís Almeida, Albert Benveniste, Bruno Bouyssounouse, Giorgio C. Buttazzo, Ivica Crnkovic, Werner Damm, Jakob Engblom, Gerhard Fohler, Marisol García-Valls, Hermann Kopetz, Yassine Lakhnech, François Laroussinie, Luciano Lavagno, Giuseppe Lipari, Florence Maraninchi, Philipp Peti, Juan Antonio de la Puente, Norman Scaife, Joseph Sifakis, Robert de Simone, Martin Törngren, Paulo Veríssimo, Andy J. Wellings, Reinhard Wilhelm, Tim A. C. Willemse, Wang Yi:
Guidelines for a graduate curriculum on embedded software and systems. ACM Trans. Embed. Comput. Syst. 4(3): 587-611 (2005) - [j7]Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo:
Solving Vector Consensus with a Wormhole. IEEE Trans. Parallel Distributed Syst. 16(12): 1120-1131 (2005) - [c55]Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo:
How Resilient are Distributed f Fault/Intrusion-Tolerant Systems? DSN 2005: 98-107 - [c54]Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo:
Resilient State Machine Replication. PRDC 2005: 305-309 - 2004
- [c53]António Casimiro, Jörg Kaiser, Paulo Veríssimo:
An architectural framework and a middleware for cooperating smart components. Conf. Computing Frontiers 2004: 28-39 - [c52]Luis Sardinha, Nuno Ferreira Neves, Paulo Veríssimo:
Tolerating Intrusions in Grid Systems. Security and Management 2004: 207-220 - [c51]Pedro Martins, Paulo Jorge Paiva de Sousa, António Casimiro, Paulo Veríssimo:
Dependable Adaptive Real-Time Applications in Wormhole-based Systems. DSN 2004: 567- - [c50]Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. SRDS 2004: 174-183 - 2003
- [c49]Paulo Veríssimo:
Uncertainty and Predictability: Can They Be Reconciled? Future Directions in Distributed Computing 2003: 108-113 - [c48]José Rufino, Paulo Veríssimo, Guilherme Arroz:
Node Failure Detection and Membership in CANELy. DSN 2003: 331-340 - [c47]Paulo Veríssimo:
Trustworthiness of Open Information Systems: How Should It Be Achieved? SRDS 2003: 315- - [c46]Paulo Veríssimo, António Casimiro:
Event-Driven Support of Real-Time Sentient Objects. WORDS 2003: 2-9 - 2002
- [j6]Paulo Veríssimo, António Casimiro:
The Timely Computing Base Model and Architecture. IEEE Trans. Computers 51(8): 916-930 (2002) - [c45]António Casimiro, Paulo Veríssimo:
Generic Timing Fault Tolerance using a Timely Computing Base. DSN 2002: 27-38 - [c44]Miguel Correia, Paulo Veríssimo, Nuno Ferreira Neves:
The Design of a COTSReal-Time Distributed Security Kernel. EDCC 2002: 234-252 - [c43]Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia:
Intrusion-Tolerant Architectures: Concepts and Design. WADS 2002: 3-36 - [c42]Miguel Correia, Lau Cheuk Lung, Nuno Ferreira Neves, Paulo Veríssimo:
Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model. SRDS 2002: 2-11 - 2001
- [b1]Paulo Veríssimo, Luís E. T. Rodrigues:
Distributed systems for system architects. Advances in distributed computing and middelware 1, Springer 2001, ISBN 978-0-7923-7266-0, pp. I-XIX, 1-623 - [j5]Achour Mostéfaoui, Michel Raynal, Paulo Veríssimo:
The logically instantaneous communication mode: a communication abstraction. Future Gener. Comput. Syst. 17(6): 669-678 (2001) - [c41]Miguel Correia, Paulo Veríssimo, Nuno Ferreira Neves:
The Architecture of a Secure Group Communication System Based on Intrusion Tolerance. ICDCS Workshops 2001: 17-24 - [c40]António Casimiro, Pedro Martins, Luís E. T. Rodrigues, Paulo Veríssimo:
Measuring Distributed Durations with Stable Error. RTSS 2001: 310-319 - [c39]António Casimiro, Paulo Veríssimo:
Using the Timely Computing Base for Dependable QoS Adaptation. SRDS 2001: 208-217 - 2000
- [j4]Luís E. T. Rodrigues, Katherine Guo, Paulo Veríssimo, Kenneth P. Birman:
A Dynamic Light-Weight Group Service. J. Parallel Distributed Comput. 60(12): 1449-1479 (2000) - [c38]Paulo Veríssimo, António Casimiro, Christof Fetzer:
he Timely Computing Base: Timely Actions in the Presence of Uncertain Timeliness. DSN 2000: 533-542
1990 – 1999
- 1999
- [c37]Paulo Veríssimo, Michel Raynal:
Time in Distributed System Models and Algorithms. Advances in Distributed Systems 1999: 1-32 - [c36]Luís E. T. Rodrigues, Paulo Veríssimo:
Topology-Aware Algorithms for Large-Scale Communication. Advances in Distributed Systems 1999: 127-156 - [c35]François J. N. Cosquer, Paulo Veríssimo, Sacha Krakowiak, Loïc Decloedt:
Support for Distributed CSCW Applications. Advances in Distributed Systems 1999: 295-326 - [c34]José Rufino, Paulo Veríssimo, Guilherme Arroz:
A Columbus' Egg Idea for CAN Media Redundancy. FTCS 1999: 286-293 - [c33]José Rufino, Guilherme Arroz, Paulo Veríssimo:
Embedded Platforms for Distributed Real-Time Computing: Challenges and Results. ISORC 1999: 147- - [c32]Achour Mostéfaoui, Michel Raynal, Paulo Veríssimo:
Logically Instantaneous Communication on Top of Distributed Memory Parallel Machines. PaCT 1999: 258-270 - 1998
- [c31]José Rufino, Paulo Veríssimo, Guilherme Arroz, Carlos Almeida, Luís E. T. Rodrigues:
Fault-Tolerant Broadcasts in CAN. FTCS 1998: 150-159 - [c30]José Rufino, Nuno Pedrosa, José Monteiro, Paulo Veríssimo, Guilherme Arroz:
Hardware support for CAN fault-tolerant communication. ICECS 1998: 263-266 - [c29]Carlos Almeida, Paulo Veríssimo:
Using Light-Weight Groups to Handle Timing Failures in Quasi-Synchronous Systems. RTSS 1998: 430-439 - 1997
- [j3]Paulo Veríssimo, Luís E. T. Rodrigues, António Casimiro:
CesiumSpray: a Precise and Accurate Global Time Service for Large-scale Systems. Real Time Syst. 12(3): 243-294 (1997) - [c28]Paulo Veríssimo, José Rufino, Li Ming:
How Hard is Hard Real-time Communication on Field-Buses?. FTCS 1997: 112-121 - [c27]Paulo Veríssimo:
On the Role of Time in Distributed Systems. FTDCS 1997: 316-323 - 1996
- [j2]Paulo Veríssimo:
Causal Delivery Protocols in Real-time Systems: A Generic Model. Real Time Syst. 10(1): 45-73 (1996) - [c26]Idalina Videira, Paulo Veríssimo, Helena Sarmento:
Efficient Communication in a Design Environment. DAC 1996: 169-174 - [c25]Carlos Almeida, Paulo Veríssimo:
Timing Failure Detection and Real-Time Group Communication in Quasi-Synchronous Systems. RTS 1996: 230-236 - [c24]François J. N. Cosquer, Pedro Antunes, Paulo Veríssimo:
Enhancing Dependability of Cooperative Applications in Partitionable Environments. EDCC 1996: 335-352 - [c23]Luís E. T. Rodrigues, Henrique Fonseca, Paulo Veríssimo:
Totally Ordered Multicast in Large-Scale Systems. ICDCS 1996: 503-510 - [c22]Luís E. T. Rodrigues, Katherine Guo, Antonio Sargento, Robbert van Renesse, Bradford B. Glade, Paulo Veríssimo, Kenneth P. Birman:
A Transparent Light-Weight Group Service. SRDS 1996: 130-139 - 1995
- [c21]François J. N. Cosquer, Paulo Veríssimo:
The impact of group communication paradigms on groupware support. FTDCS 1995: 207-215 - [c20]Luís E. T. Rodrigues, Henrique Fonseca, Paulo Veríssimo:
Reliable Computing Over Mobile Networks. FTDCS 1995: 488-494 - [c19]Luís E. T. Rodrigues, Paulo Veríssimo:
Causal Separators for Large-Scale Multicast Communication. ICDCS 1995: 83-91 - [c18]François J. N. Cosquer, Luís E. T. Rodrigues, Paulo Veríssimo:
Using Tailored Failure Suspectors to Support Distributed Cooperative Applications. Parallel and Distributed Computing and Systems 1995: 352-358 - 1994
- [j1]Paulo Veríssimo:
Ordering and Timeliness Requirements of Dependable Real-Time Programs. Real Time Syst. 7(2): 105-128 (1994) - [c17]Luís E. T. Rodrigues, Paulo Veríssimo:
How to avoid cost of causal communication in large-scale Systems. ACM SIGOPS European Workshop 1994: 106-111 - [c16]Luís E. T. Rodrigues, Ellen H. Siegel, Paulo Veríssimo:
A Replication-Transparent Remote Invocation Protocol. SRDS 1994: 160-169 - 1993
- [c15]Luís E. T. Rodrigues, Paulo Veríssimo, José Rufino:
A Low-level Processor Group Membership Protocol for LANS. ICDCS 1993: 541-550 - [c14]Paulo Veríssimo, António Casimiro, Luís E. T. Rodrigues:
Using Atomic Broadcast to Implement a posteriori Agreement for Clock Synchronization. SRDS 1993: 115-124 - 1992
- [c13]Paulo Veríssimo, Luís E. T. Rodrigues:
A posteriori Agreement for Fault-Tolerant Clock Synchronization on Broadcast Networks. FTCS 1992: 527-536 - [c12]José Rufino, Paulo Veríssimo:
A Study on the Inaccessibility Characteristics of ISO 8802/4 Token-Bus LANs. INFOCOM 1992: 958-967 - [c11]Paulo Veríssimo, Luís E. T. Rodrigues:
Group orientation: a paradigm for modern distributed systems. ACM SIGOPS European Workshop 1992 - [c10]Werner Vogels, Paulo Veríssimo, Luís E. T. Rodrigues:
Requirements for high performance group support in distributed systems. ACM SIGOPS European Workshop 1992 - [c9]Luís E. T. Rodrigues, Paulo Veríssimo:
xAMp: A Multi-primitive Group Communications Service. SRDS 1992: 112-121 - 1990
- [c8]Mário Baptista, Susanne Graf, Jean-Luc Richier, Luís E. T. Rodrigues, Carlos Rodriguez, Paulo Veríssimo, Jacques Voiron:
Formal Specification and Verification of a Network Independent Atomic Multicast Protocol. FORTE 1990: 345-352 - [c7]Peter A. Barrett, Andrew M. Hilborne, Peter G. Bond, Douglas T. Seaton, Paulo Veríssimo, Luís E. T. Rodrigues, Neil A. Speirs:
The Delta-4 extra performance architecture (XPA). FTCS 1990: 481-488 - [c6]Paulo Veríssimo:
Design of fault tolerant distributed systems: the fail-controlled approach. ACM SIGOPS European Workshop 1990 - [c5]Paulo Veríssimo, José Alves Marques:
Reliable Broadcast for Fault-Tolerance on Local Computer Networks. SRDS 1990: 54-63 - [c4]Paulo Veríssimo:
Real-Time Data Management with Clock-Less Reliable Broadcast Protocols. Workshop on the Management of Replicated Data 1990: 20-24
1980 – 1989
- 1989
- [c3]Paulo Veríssimo, Luís E. T. Rodrigues, Mário Baptista:
AMp: A Highly Parallel Atomic Multicast Protocol. SIGCOMM 1989: 83-93 - 1988
- [c2]David Powell, Gottfried Bonn, Douglas T. Seaton, Paulo Veríssimo, F. Waeselynck:
The Delta-4 approach to dependability in open distributed computing systems. FTCS 1988: 246-251 - [c1]Paulo Jorge Esteves Veríssimo:
Redundant media mechanisms for dependable communication in token-bus LANs. LCN 1988: 453-462
Coauthor Index
aka: Alysson Bessani
aka: Jérémie Decouchant
aka: Nuno Ferreira Neves
aka: Paulo Jorge Paiva de Sousa
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint