default search action
Jean Everson Martina
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Fernanda Oliveira Gomes, Roberto Pellungrini, Anna Monreale, Chiara Renso, Jean Everson Martina:
TrajectGuard: A Comprehensive Privacy-Risk Framework for Multiple-Aspects Trajectories. IEEE Access 12: 136354-136378 (2024) - [j9]Antônio Carlos Mariani, Lucas Machado da Palma, Jean Everson Martina:
The Digital Degree Certification Revolution in Brazil and Beyond. Commun. ACM 67(8): 88-89 (2024) - [c29]Maurício de Vasconcelos Barros, Jean Everson Martina:
SovereignRx: An Electronic Prescription System Based on High Privacy, Blockchain, and Self-Sovereign Identity. AINA (4) 2024: 372-383 - 2023
- [j8]Wesley dos Reis Bezerra, Jean Everson Martina, Carlos Becker Westphall:
A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic. Sensors 23(15): 6933 (2023) - 2022
- [j7]Johann Westphall, Jean Everson Martina:
Blockchain Privacy and Scalability in a Decentralized Validated Energy Trading Context with Hyperledger Fabric. Sensors 22(12): 4585 (2022) - 2021
- [j6]Gabriel Estevam, Lucas M. Palma, Luan R. Silva, Jean Everson Martina, Martín Vigil:
Accurate and decentralized timestamping using smart contracts on the Ethereum blockchain. Inf. Process. Manag. 58(3): 102471 (2021) - [j5]Alexandre Augusto Giron, Jean Everson Martina, Ricardo Felipe Custódio:
Steganographic Analysis of Blockchains. Sensors 21(12): 4078 (2021) - 2020
- [c28]Alexandre Augusto Giron, Jean Everson Martina, Ricardo Felipe Custódio:
Bitcoin Blockchain Steganographic Analysis. ACNS Workshops 2020: 41-57 - [c27]Yuri da Silva Villas Boas, Daniel Santana Rocha, Charles F. de Barros, Jean Everson Martina:
SRVB cryptosystem: another attempt to revive Knapsack-based public-key encryption schemes. ICT 2020: 1-6 - [c26]Fernanda Oliveira Gomes, Bruno Machado Agostinho, Jean Everson Martina:
Fraud Prevention Within the Brazilian Governmental Public-Key Infrastructure. ISI 2020: 1-6 - [c25]Yuri da Silva Villas Boas, Daniel Santana Rocha, Charles F. de Barros, Jean Everson Martina:
F2MH Cryptosystem: Preliminary analysis of an original attempt to revive Knapsack-based public-key encryption schemes. PDP 2020: 211-215 - [c24]João Vicente Meyer, Lucas Machado da Palma, Jean Everson Martina:
Document Validation using Blockchain: A validation scheme for natural persons documents. SBRC Companion 2020: 249-256
2010 – 2019
- 2019
- [j4]Lucas M. Palma, Martín A. Gagliotti Vigil, Fernando Lauro Pereira, Jean Everson Martina:
Blockchain and smart contracts for higher education registry in Brazil. Int. J. Netw. Manag. 29(3) (2019) - [c23]Cristiane Dias Lepiane, Fernando Lauro Pereira, Giovani Pieri, Douglas Marcelino Beppler Martins, Jean Everson Martina, Mauro Luiz Rabelo:
Digital Degree Certificates for Higher Education in Brazil: A Technical Policy Specification. DocEng 2019: 7:1-7:10 - [c22]Lucas M. Palma, Fernanda Oliveira Gomes, Martín A. Gagliotti Vigil, Jean Everson Martina:
A Transparent and Privacy-Aware Approach Using Smart Contracts for Car Insurance Reward Programs. ICISS 2019: 3-20 - 2018
- [c21]Lucas Pandolfo Perin, Gustavo Zambonin, Douglas Marcelino Beppler Martins, Ricardo Felipe Custódio, Jean Everson Martina:
Tuning the Winternitz hash-based digital signature scheme. ISCC 2018: 537-542 - [c20]Fernanda Oliveira Gomes, Douglas Simões Silva, Bruno Machado Agostinho, Jean Everson Martina:
Privacy Preserving on Trajectories Created by Wi-Fi Connections in a University Campus. ISI 2018: 181-186 - [c19]Taciane Martimiano, Jean Everson Martina:
Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies. Security Protocols Workshop 2018: 96-105 - [c18]Jean Everson Martina:
Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies (Transcript of Discussion). Security Protocols Workshop 2018: 106-113 - 2017
- [j3]Paulo Eduardo Battistella, Christiane Gresse von Wangenheim, Jean Everson Martina:
Design and Large-scale Evaluation of Educational Games for Teaching Sorting Algorithms. Informatics Educ. 16(2): 141-164 (2017) - [c17]Thaís Bardini Idalino, Dayana Spagnuelo, Jean Everson Martina:
Private Verification of Access on Medical Data: An Initial Study. DPM/CBT@ESORICS 2017: 86-103 - 2016
- [c16]Taciane Martimiano, Jean Everson Martina:
Threat Modelling Service Security as a Security Ceremony. ARES 2016: 195-204 - [c15]Thaís Bardini Idalino, Marina Coelho, Jean Everson Martina:
Automated Issuance of Digital Certificates through the Use of Federations. ARES 2016: 725-732 - [c14]Douglas Simões Silva, Davi Resner, Rick Lopes de Souza, Jean Everson Martina:
Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks. ICISS 2016: 426-443 - [c13]Paulo Eduardo Battistella, Giani Petri, Christiane Gresse von Wangenheim, Aldo von Wangenheim, Jean Everson Martina:
SORTIA 2.0:Um jogo de ordenação para o ensino de Estrutura de Dados [SORTIA 2.0: A sorting game for data structure teaching]. SBSI 2016: 558-565 - 2015
- [j2]Jean Everson Martina, Eduardo dos Santos, Marcelo Carlomagno Carlos, Geraint Price, Ricardo Felipe Custódio:
An adaptive threat model for security ceremonies. Int. J. Inf. Sec. 14(2): 103-121 (2015) - [j1]Jean Everson Martina, Lawrence C. Paulson:
Verifying multicast-based security protocols using the inductive method. Int. J. Inf. Sec. 14(2): 187-204 (2015) - 2014
- [c12]Felipe Coral Sasso, Ricardo Alexandre Reinaldo De Moraes, Jean Everson Martina:
A Proposal for a Unified Identity Card for Use in an Academic Federation Environment. ARES 2014: 265-272 - [c11]Taciane Martimiano, Jean Everson Martina, Maina M. Olembo, Marcelo Carlomagno Carlos:
Modelling User Devices in Security Ceremonies. STAST 2014: 16-23 - 2013
- [c10]Antônio Augusto Fröhlich, Alexandre Massayuki Okazaki, Rodrigo Vieira Steiner, Peterson Oliveira, Jean Everson Martina:
A cross-layer approach to trustfulness in the Internet of Things. ISORC 2013: 1-8 - [c9]Jean Everson Martina, Lawrence C. Paulson:
Verifying multicast-based security protocols using the inductive method. SAC 2013: 1824-1829 - [c8]Marcelo Carlomagno Carlos, Jean Everson Martina, Geraint Price, Ricardo Felipe Custódio:
An updated threat model for security ceremonies. SAC 2013: 1836-1843 - [c7]Jean Everson Martina:
The Ever Changing Threat Model: A Social-Technical Perspective. STAST 2013: 1 - 2012
- [c6]Marcelo Carlomagno Carlos, Jean Everson Martina, Geraint Price, Ricardo Felipe Custódio:
A Proposed Framework for Analysing Security Ceremonies. SECRYPT 2012: 440-445 - [c5]Eduardo dos Santos, Jean Everson Martina, Ricardo Felipe Custódio:
Towards a Formal Verification of a Multi-factor Authentication Protocol Using Automated Theorem Provers. TrustCom 2012: 84-91 - 2011
- [b1]Jean Everson Martina:
Verification of security protocols based on multicast communication. University of Cambridge, UK, 2011
2000 – 2009
- 2009
- [c4]Jean Everson Martina, Túlio Cicero Salvaro de Souza, Ricardo Felipe Custódio:
Ceremonies Formal Analysis in PKI's Context. CSE (3) 2009: 392-398 - [c3]Thiago Souza Araujo, Jean Everson Martina:
Economics Applied to Information Security: The Brazilian Electronic Bill of Sale Case. Web Intelligence/IAT Workshops 2009: 307-310 - 2008
- [c2]Túlio Cicero Salvaro de Souza, Jean Everson Martina, Ricardo Felipe Custódio:
Audit and backup procedures for hardware security modules. IDtrust 2008: 89-97 - 2007
- [c1]Jean Everson Martina, Túlio Cicero Salvaro de Souza, Ricardo Felipe Custódio:
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules. EuroPKI 2007: 220-235
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint