Search Results - "Reis Bezerra, Wesley"

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Performance of security options for message protocols: A comparative analysis by Reis Bezerra, Wesley, Koch, Fernando, Becker Westphall, Carlos

    “…We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing,…”
    Get full text
    Journal Article
  2. 2

    Advances in Distributed Load Orchestration for Vision Computing in 5G-MEC Environments by do Nascimento Boing, Ricardo, Vaz Sampaio, Hugo, Koch, Fernando, dos Reis Bezerra, Wesley, Nolio Santa Cruz, Rene, Westphall, Carlos Becker

    “…Multi-access Edge Computing (MEC) is a type of network architecture that provides cloud computing capabilities at the edge of the network. We consider the use…”
    Get full text
    Conference Proceeding
  3. 3
  4. 4

    Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing by Bezerra, Wesley dos Reis, Westphal, Carlos Becker

    Published 26-09-2022
    “…The few resources available on devices restricted in Internet of Things are an important issue when we think about security. In this perspective, our work…”
    Get full text
    Journal Article
  5. 5

    A Comparative Qualitative and Quantitative Analysis of the Performance of Security Options for Message Protocols: Fog Computing Scenario by Bezerra, Wesley dos Reis, Koch, Fernando, Westphall, Carlos Becker

    Published 23-10-2022
    “…We analyze the utilization of publish-subscribe protocols in IoT and Fog Computing and challenges around security configuration, performance, and qualitative…”
    Get full text
    Journal Article
  6. 6

    Models of Computing as a Service and IoT: an analysis of the current scenario with applications using LPWAN by Bezerra, Wesley dos Reis, Koch, Fernando Luiz, Westphall, Carlos Becker

    Published 12-05-2021
    “…Revista de Sistemas de Informacao da FSMA, 25:56-65, 2020 This work provides the basis to understand and select Cloud Computing models applied for the…”
    Get full text
    Journal Article
  7. 7

    A Bibliometrics Analysis on 28 years of Authentication and Threat Model Area by Bezerra, Wesley dos Reis, de Souza, Cristiano Antônio, Westphall, Carla Merkle, Westphall, Carlos Becker

    Published 26-09-2022
    “…The large volume of publications in any research area can make it difficult for researchers to track their research areas' trends, challenges, and…”
    Get full text
    Journal Article
  8. 8

    Characteristics and Main Threats about Multi-Factor Authentication: A Survey by Bezerra, Wesley dos Reis, de Souza, Cristiano Antônio, Westphall, Carla Merkle, Westphall, Carlos Becker

    Published 26-09-2022
    “…This work reports that the Systematic Literature Review process is responsible for providing theoretical support to research in the Threat Model and…”
    Get full text
    Journal Article