Profil

ESTEVES-VERISSIMO Paulo

Main Referenced Co-authors
DECOUCHANT, Jérémie  (18)
VÖLP, Marcus  (16)
FERNANDES, Maria  (7)
Yu, Jiangshan (6)
KREUTZ, Diego  (5)
Main Referenced Keywords
Privacy (5); security (4); perfect forward secrecy (3); privacy (3); SDN (3);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Critical and Extreme Security and Dependability Research Group (CritiX) (11)
Interdisciplinary Centre for Security, Reliability and Trust (1)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Automation & Robotics Research Group (1)
Interdisciplinary Centre for Security, Reliability and Trust – University of Luxembourg, Luxembourg. (1)
SnT – Interdisciplinary Centre for Security, Reliability and Trust (1)
Main Referenced Disciplines
Computer science (40)
Engineering, computing & technology: Multidisciplinary, general & others (2)

Publications (total 40)

The most downloaded
8568 downloads
Kreutz, D., Ramos, F. M. V., Verissimo, P., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2015). Software-Defined Networking: A Comprehensive Survey. Proceedings of the IEEE, 103 (1), 14-76. doi:10.1109/JPROC.2014.2371999 https://hdl.handle.net/10993/20596

The most cited

3504 citations (Scopus®)

Kreutz, D., Ramos, F. M. V., Verissimo, P., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2015). Software-Defined Networking: A Comprehensive Survey. Proceedings of the IEEE, 103 (1), 14-76. doi:10.1109/JPROC.2014.2371999 https://hdl.handle.net/10993/20596

Shoker, A., ESTEVES-VERISSIMO, P., & VÖLP, M. (2023). The Path to Fault- and Intrusion-Resilient Manycore Systems on a Chip. In Proceedings - 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2023. Institute of Electrical and Electronics Engineers Inc. doi:10.1109/DSN-S58398.2023.00043
Peer reviewed

Pascoal, T., Decouchant, J., Boutet, A., & Esteves-Verissimo, P. (22 September 2021). DyPS: Dynamic, Private and Secure GWAS (Summary) - GenoPri'21 Talk [Paper presentation]. ​​8th International Workshop on ​Genome Privacy and Security (GenoPri'21).

Pascoal, T., Decouchant, J., Boutet, A., & Esteves-Verissimo, P. (2021). DyPS: Dynamic, Private and Secure GWAS. Proceedings on Privacy Enhancing Technologies. doi:10.2478/popets-2021-0025
Peer Reviewed verified by ORBi

Kozhaya, D., Decouchant, J., Rahli, V., & Esteves-Verissimo, P. (2020). PISTIS: From a Word-of-Mouth to a Gentleman’s Agreement. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/44078.

Esteves-Verissimo, P., Decouchant, J., Volp, M., Esfahani, A., & Graczyk, R. (2020). PriLok:Citizen-protecting distributed epidemic tracing. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/43191.

Pinto Gouveia, I., Volp, M., & Esteves-Verissimo, P. (2020). Behind the Last Line of Defense -- Surviving SoC Faults and Intrusions. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/43197.

Cao, T., Yu, J., Decouchant, J., Luo, X., & Verissimo, P. (2020). Exploring the Monero Peer-to-Peer Network. In T. Cao, J. Yu, J. Decouchant, X. Luo, ... P. Verissimo, Financial Cryptography and Data Security 2020, Sabah, 10-14 February 2020.
Peer reviewed

Fernandes, M., Decouchant, J., Volp, M., M. Couto, F., & Verissimo, P. (22 October 2019). Privacy-Preserving Processing of Filtered DNA Reads [Paper presentation]. ​​6th International Workshop on ​Genome Privacy and Security.

Natoli, C., Yu, J., Gramoli, V., & Verissimo, P. (2019). Deconstructing Blockchains: A Comprehensive Survey on Consensus, Membership and Structure. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/40745.

Decouchant, J., Boutet, A., Yu, J., & Verissimo, P. (October 2019). P3LS : Plausible Deniability for Practical Privacy-Preserving Live Streaming [Paper presentation]. 38th International Symposium on Reliable Distributed Systems (SRDS 2019).

Fernandes, M., Decouchant, J., Volp, M., Couto, F., & Verissimo, P. (2019). DNA-SeAl: Sensitivity Levels to Optimize the Performance of Privacy-Preserving DNA Alignment. IEEE Journal of Biomedical and Health Informatics. doi:10.1109/JBHI.2019.2914952
Peer reviewed

Yu, J., Au, M. H. A., & Verissimo, P. (June 2019). Re-thinking untraceability in the CryptoNote-style blockchain [Paper presentation]. IEEE Computer Security Foundations Symposium (CSF) 2019.

Kozhaya, D., Decouchant, J., & Verissimo, P. (01 March 2019). RT-ByzCast: Byzantine-Resilient Real-Time Reliable Broadcast. IEEE Transactions on Computers, 68 (3). doi:10.1109/TC.2018.2871443
Peer Reviewed verified by ORBi

Vukotic, I., Rahli, V., & Verissimo, P. (2019). Asphalion: Trustworthy Shielding Against Byzantine Faults. In I. Vukotic, V. Rahli, ... P. Verissimo, Asphalion: Trustworthy Shielding Against Byzantine Faults.
Peer reviewed

Yu, J., Kozhaya, D., Decouchant, J., & Verissimo, P. (2019). RepuCoin: Your Reputation is Your Power. IEEE Transactions on Computers. doi:10.1109/TC.2019.2900648
Peer Reviewed verified by ORBi

Kreutz, D., Yu, J., Ramos, F. M. V., & Verissimo, P. (2019). ANCHOR: logically-centralized security for Software-Defined Networks. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/34586. doi:10.1145/3301305

Paverd, A., Volp, M., Brasser, F., Schunter, M., N Asokan, Sadeghi, A.-R., Verissimo, P., Steininger, A., & Holz, T. (2019). Sustainable Security and Safety: Challenges and Opportunities. OASIcs: OpenAccess Series in Informatics, 73. doi:10.4230/OASICS.CERTS.2019.4
Peer reviewed

Kreutz, D., Yu, J., Verissimo, P., Ramos, F., & Magalhaes, C. (October 2018). The KISS principle in Software-Defined Networking: a framework for secure communications. IEEE Security & Privacy Magazine, 16 (05), 60-70. doi:10.1109/MSP.2018.3761717
Peer reviewed

Fröhlich, A. A., Scheffel, M. R., Kozhaya, D., & Verissimo, P. (2018). Byzantine Resilient Protocol for the IoT. IEEE Internet of Things Journal. doi:10.1109/JIOT.2018.2871157
Peer Reviewed verified by ORBi

Cao, T., Yu, J., Decouchant, J., & Verissimo, P. (25 June 2018). Revisiting Network-Level Attacks on Blockchain Network [Paper presentation]. DSN Workshop on Byzantine Consensus and Resilient Blockchains.

Volp, M., & Verissimo, P. (2018). Intrusion-Tolerant Autonomous Driving. Proceedings of 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC). doi:10.1109/ISORC.2018.00026
Peer reviewed

Rahli, V., Vukotic, I., Volp, M., & Verissimo, P. (2018). Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq. In ESOP 2018.
Peer reviewed

Lambert, C., Fernandes, M., Decouchant, J., & Verissimo, P. (2018). MaskAl: Privacy Preserving Masked Reads Alignment using Intel SGX [Paper presentation]. 37th IEEE International Symposium on Reliable Distributed Systems.

Mirto, C., Yu, J., Rahli, V., & Verissimo, P. (2018). Probabilistic Formal Methods Applied to Blockchain’s Consensus Protocol [Paper presentation]. DSN Workshop on Byzantine Consensus and Resilient Blockchains.

Decouchant, J., Fernandes, M., Volp, M., Couto, F. M., & Verissimo, P. (2018). Accurate filtering of privacy-sensitive information in raw genomic data. Journal of Biomedical Informatics. doi:10.1016/j.jbi.2018.04.006
Peer Reviewed verified by ORBi

Volp, M., Kozhaya, D., & Verissimo, P. (December 2017). Facing the Safety-Security Gap in RTES: the Challenge of Timeliness [Paper presentation]. 2nd Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS 2017) co-located with RTSS 2017.

Cornelius, G. P., Hochgeschwender, N., Voos, H., Olivares Mendez, M. A., Caire, P., Volp, M., & Verissimo, P. (2017). A Perspective of Security for Mobile Service Robots. In Iberian Robotics Conference, Seville, Spain, 2017.
Peer reviewed

Volp, M., Decouchant, J., Lambert, C., Fernandes, M., & Verissimo, P. (October 2017). Enclave-Based Privacy-Preserving Alignment of Raw Genomic Information [Paper presentation]. SysTEX 2017. doi:10.1145/3152701.3152707

Kreutz, D., Verissimo, P., Magalhaes, C., & Ramos, F. M. V. (2017). The KISS principle in Software-Defined Networking: An architecture for Keeping It Simple and Secure.

Volp, M., Rocha, F., Decouchant, J., Yu, J., & Verissimo, P. (2017). Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come. In Twenty-fifth International Workshop on Security Protocols.
Peer reviewed

Verissimo, P., Volp, M., Decouchant, J., & Rocha, F. (2017). Meeting the Challenges of Critical and Extreme Dependability and Security. In Proceedings of the 22nd Pacific Rim International Symposium on Dependable Computing (pp. 92-97).
Peer reviewed

Cogo, V. V., Bessani, A., Couto, F. M., Gama-Carvalho, M., Fernandes, M., & Verissimo, P. (2017). How can photo sharing inspire sharing genomes? In 11th International Conference on Practical Applications of Computational Biology & Bioinformatics 2017.
Peer reviewed

Fernandes, M., Decouchant, J., Couto, F. M., & Verissimo, P. (2017). Cloud-Assisted Read Alignment and Privacy. In 11th International Conference on Practical Applications of Computational Biology & Bioinformatics 2017.
Peer reviewed

Volp, M., Lackorzynski, A., Decouchant, J., Rahli, V., Rocha, F., & Verissimo, P. (12 December 2016). Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control [Paper presentation]. 1st Workshop on System Software for Trusted Execution (SysTEX '16), Trento, Italy. doi:10.1145/3007788.3007794

Caldeira Lima, A., Rocha, F., Volp, M., & Verissimo, P. (2016). Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems. In Proceedings of the Second ACM Workshop on Cyber-Physical Systems Security and PrivaCy. doi:10.1145/2994487.2994489
Peer reviewed

Bessani, A., Neves, N. F., Verissimo, P., Wagner, D., Fonseca, A., Rui, S., Luz, P., & Correia, M. (2016). JITeR: Just-in-time application-layer routing. Computer Networks, (104), 122-136. doi:10.1016/j.comnet.2016.05.010
Peer Reviewed verified by ORBi

Verissimo, P., & Decouchant, J. (16 March 2016). The big data deluge in biomedicine: addressing the privacy vs. sharing dilemma [Paper presentation]. Grande Region Security and Reliability Day, Nancy, France.

Cogo, V. V., Bessani, A., Couto, F. M., & Verissimo, P. (2015). A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data. Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 101-110. doi:10.1145/2808138.2808139
Peer reviewed

Ramos, F. M. V., Kreutz, D., & Verissimo, P. (2015). On the Road to the Softwarization of Networking. Cutter IT Journal, 28, 6-13.

Kreutz, D., Ramos, F. M. V., Verissimo, P., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2015). Software-Defined Networking: A Comprehensive Survey. Proceedings of the IEEE, 103 (1), 14-76. doi:10.1109/JPROC.2014.2371999
Peer reviewed

Contact ORBilu