Henrique Domingos - Academia.edu (original) (raw)

Henrique  Domingos

Henrique Domingos is Assistant Professor at DI FCT UNL (Computer Science Department, Faculdade de Ciências e Tecnologia - Universidade Nova de Lisboa) and researcher at the Computer Systems group of the NOVA Laboratory for Computer Science and Informatics. Se started the academic career at the Department of Computer Science/Faculty of Sciences - University of Lisbon. I was invited professor at the Rutgers University, invited researcher in European Projects at IBM Research Center, INRIA and Chorus Systèmmes and founder of four startup companies, with particular focus on Fintech, eBanking and eFinance solutions.The broad aim of my current research in Nova Lincs is to develop security and privacy techniques that allow large scale systems to operate under reliability, security and trustability assumptions. In the integrated work developed at the Computer System group, we focus on different innovative contributions, from principles and theoretical foundations to experimental research on systems design, implementation and assessment.

less

Uploads

Papers by Henrique Domingos

Research paper thumbnail of Session details: Group and team management

SIGCSE bulletin, Sep 1, 2005

Research paper thumbnail of Privacy-Preserving Content-Based Image Retrieval in the Cloud

arXiv (Cornell University), Nov 18, 2014

Research paper thumbnail of Região e Regionalização: Uma Proposta De Atividade Para O Ensino Fundamental

De acordo com a abordagem Historico-Cultural e as concepcoes de ensino de Geografia tendo como ob... more De acordo com a abordagem Historico-Cultural e as concepcoes de ensino de Geografia tendo como objetivo o desenvolvimento do Raciocinio Geografico, o trabalho do professor e o de mediar o processo de aprendizagem de conceitos cientificos por parte dos alunos. Assim, dois bolsistas do Programa Residencia Pedagogica planejaram e regeram aulas sobre Regiao e Regionalizacao para uma turma de 7o ano do Ensino Fundamental em uma Escola Municipal de Rio Claro/SP. A intencao era a de possibilitar aos alunos a aprendizagem de diferentes nocoes de Regiao e seus criterios para regionalizacao, alem de averiguar e aprimorar os conhecimentos e habilidades cartograficas dos estudantes por meio de atividades como a elaboracao de um croqui da sala de aula e de sua regionalizacao com base nas cores das carteiras, a regionalizacao da escola utilizando a ferramenta Google My Maps, alem da exposicao e discussao sobre mapas e imagens de satelite de diferentes locais e escalas. Durante as regencias, parte...

Research paper thumbnail of Topic 15: Peer-to-Peer and Web Computing

Research paper thumbnail of Comunicação IP com identificadores criptograficamente gerados para prevenção de DDoS

Research paper thumbnail of Privacy-Preserving Content-Based Image Retrieval in the Cloud

arXiv (Cornell University), Nov 18, 2014

Research paper thumbnail of Deteção e combate a ataques de negação de serviço com base em identificadores

Research paper thumbnail of Cifra Multimodal Indexável para Aplicações Móveis baseadas na Nuvem

Research paper thumbnail of Proceedings of the NetCoM 2009 - International Conference on Networks and Communications

Research paper thumbnail of Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)

IACR Cryptology ePrint Archive, 2015

Research paper thumbnail of EIP - Preventing DDoD with Ephemeral IP Identifiers Cryptographically Generated

Research paper thumbnail of Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version)

IACR Cryptology ePrint Archive, 2017

Research paper thumbnail of EIP - Preventing DDoS with Ephemeral IP Identifiers Cryptographically Generated

arXiv (Cornell University), Dec 21, 2016

Research paper thumbnail of MuSE: Multimodal Searchable Encryption for Cloud Applications

Research paper thumbnail of Session details: Group and team management

Research paper thumbnail of BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage

Research paper thumbnail of TMS: a trusted mail repository service using public storage clouds

In this paper we present the Trusted Mail System (TMS), a dependable Email repository service tha... more In this paper we present the Trusted Mail System (TMS), a dependable Email repository service that explores multiple untrusted storage clouds for storing, accessing and searching private email data. The system architecture provides security and reliability services while leveraging the heterogeneity and diversity offered by different untrusted cloud storage solutions from different service providers. To address dependability issues, TMS enforces a security model that protects confidentiality and integrity of mailboxes stored in those clouds, adding availability, reliability and intrusion-tolerance guarantees. The system uses homomorphic encryption mechanisms and indexing techniques allowing ranked multi-keyword searching operations over encrypted email messages and its contents. We illustrate TMS feasibility from an implemented prototype, evaluating its performance, design options, and services. The experimental results show that the solution is viable, offers reliability and privac...

Research paper thumbnail of Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity

Lecture Notes in Computer Science, 2017

Research paper thumbnail of TorKameleon: Improving Tor's Censorship Resistance With K-anonymization and Media-based Covert Channels

arXiv (Cornell University), Mar 30, 2023

Research paper thumbnail of Electronic properties of a grain boundary in Sb-doped ZnO

Journal of Physics: Condensed Matter, 2001

ABSTRACT The electronic properties of a Σ = 13 32.2° [0001] tilt grain boundary in ZnO have been ... more ABSTRACT The electronic properties of a Σ = 13 32.2° [0001] tilt grain boundary in ZnO have been investigated using first-principles calculations. Two atomic models for the boundary have been considered, one of which contains structural units that are consistent with those observed for this orientation using electron microscopy. Doping both the grain boundary models with antimony reveals a strong driving force for segregation. Analysis of the electronic densities of states, bond populations and Mulliken charges shows that antimony creates a localized impurity state in the grain boundary and acts as a donor dopant. The resulting charge accumulation at the grain boundary together with the presence of local bonds that are metallic in character, will influence the mechanism for charge transport across the interface and this is discussed in relation to varistor applications.

Research paper thumbnail of Session details: Group and team management

SIGCSE bulletin, Sep 1, 2005

Research paper thumbnail of Privacy-Preserving Content-Based Image Retrieval in the Cloud

arXiv (Cornell University), Nov 18, 2014

Research paper thumbnail of Região e Regionalização: Uma Proposta De Atividade Para O Ensino Fundamental

De acordo com a abordagem Historico-Cultural e as concepcoes de ensino de Geografia tendo como ob... more De acordo com a abordagem Historico-Cultural e as concepcoes de ensino de Geografia tendo como objetivo o desenvolvimento do Raciocinio Geografico, o trabalho do professor e o de mediar o processo de aprendizagem de conceitos cientificos por parte dos alunos. Assim, dois bolsistas do Programa Residencia Pedagogica planejaram e regeram aulas sobre Regiao e Regionalizacao para uma turma de 7o ano do Ensino Fundamental em uma Escola Municipal de Rio Claro/SP. A intencao era a de possibilitar aos alunos a aprendizagem de diferentes nocoes de Regiao e seus criterios para regionalizacao, alem de averiguar e aprimorar os conhecimentos e habilidades cartograficas dos estudantes por meio de atividades como a elaboracao de um croqui da sala de aula e de sua regionalizacao com base nas cores das carteiras, a regionalizacao da escola utilizando a ferramenta Google My Maps, alem da exposicao e discussao sobre mapas e imagens de satelite de diferentes locais e escalas. Durante as regencias, parte...

Research paper thumbnail of Topic 15: Peer-to-Peer and Web Computing

Research paper thumbnail of Comunicação IP com identificadores criptograficamente gerados para prevenção de DDoS

Research paper thumbnail of Privacy-Preserving Content-Based Image Retrieval in the Cloud

arXiv (Cornell University), Nov 18, 2014

Research paper thumbnail of Deteção e combate a ataques de negação de serviço com base em identificadores

Research paper thumbnail of Cifra Multimodal Indexável para Aplicações Móveis baseadas na Nuvem

Research paper thumbnail of Proceedings of the NetCoM 2009 - International Conference on Networks and Communications

Research paper thumbnail of Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)

IACR Cryptology ePrint Archive, 2015

Research paper thumbnail of EIP - Preventing DDoD with Ephemeral IP Identifiers Cryptographically Generated

Research paper thumbnail of Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version)

IACR Cryptology ePrint Archive, 2017

Research paper thumbnail of EIP - Preventing DDoS with Ephemeral IP Identifiers Cryptographically Generated

arXiv (Cornell University), Dec 21, 2016

Research paper thumbnail of MuSE: Multimodal Searchable Encryption for Cloud Applications

Research paper thumbnail of Session details: Group and team management

Research paper thumbnail of BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage

Research paper thumbnail of TMS: a trusted mail repository service using public storage clouds

In this paper we present the Trusted Mail System (TMS), a dependable Email repository service tha... more In this paper we present the Trusted Mail System (TMS), a dependable Email repository service that explores multiple untrusted storage clouds for storing, accessing and searching private email data. The system architecture provides security and reliability services while leveraging the heterogeneity and diversity offered by different untrusted cloud storage solutions from different service providers. To address dependability issues, TMS enforces a security model that protects confidentiality and integrity of mailboxes stored in those clouds, adding availability, reliability and intrusion-tolerance guarantees. The system uses homomorphic encryption mechanisms and indexing techniques allowing ranked multi-keyword searching operations over encrypted email messages and its contents. We illustrate TMS feasibility from an implemented prototype, evaluating its performance, design options, and services. The experimental results show that the solution is viable, offers reliability and privac...

Research paper thumbnail of Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity

Lecture Notes in Computer Science, 2017

Research paper thumbnail of TorKameleon: Improving Tor's Censorship Resistance With K-anonymization and Media-based Covert Channels

arXiv (Cornell University), Mar 30, 2023

Research paper thumbnail of Electronic properties of a grain boundary in Sb-doped ZnO

Journal of Physics: Condensed Matter, 2001

ABSTRACT The electronic properties of a Σ = 13 32.2° [0001] tilt grain boundary in ZnO have been ... more ABSTRACT The electronic properties of a Σ = 13 32.2° [0001] tilt grain boundary in ZnO have been investigated using first-principles calculations. Two atomic models for the boundary have been considered, one of which contains structural units that are consistent with those observed for this orientation using electron microscopy. Doping both the grain boundary models with antimony reveals a strong driving force for segregation. Analysis of the electronic densities of states, bond populations and Mulliken charges shows that antimony creates a localized impurity state in the grain boundary and acts as a donor dopant. The resulting charge accumulation at the grain boundary together with the presence of local bonds that are metallic in character, will influence the mechanism for charge transport across the interface and this is discussed in relation to varistor applications.

Log In