Sérgio Tenreiro de Magalhães

Sérgio Tenreiro de Magalhães, PhD, teaches Information Security related topics in the Portuguese Catholic University. He is also a researcher in that university, mainly in the fields of Information Security, cyber enhanced terrorism monitoring, prevention and social impact. He has published several works in international refereed journals and in international conference proceedings and he is currently a member of several international conference committees and editorial boards.

Publications

Psychedelic Trance on the Web: Exploring Digital Parties at Second Life
Emília Simão, Sérgio Tenreiro de Magalhães, Armando Malheiro da Silva. © 2018. 18 pages.
This chapter proposes an approach about Psychedelic Trance tribe behaviours and manifestations in digital environments, and cyber ritual dynamics beyond the virtual parties in...
Digital Tools for Identity Verification and Access Control
Sérgio Tenreiro de Magalhães. © 2016. 2 hrs 5 mins.
Identity verification is an important component for security planning, both for the protection of physical assets as well as digital assets. Despite the predominance and efficacy...
Defining Authentification and Identification
Sérgio Tenreiro de Magalhães. © 2016. 12 mins.
False Acceptance Rate and False Rejection Rate
Sérgio Tenreiro de Magalhães. © 2016. 7 mins.
Passwords and the Password Paradox
Sérgio Tenreiro de Magalhães. © 2016. 14 mins.
Graphical Authentication
Sérgio Tenreiro de Magalhães. © 2016. 14 mins.
Identity Cards for Physical Access
Sérgio Tenreiro de Magalhães. © 2016. 10 mins.
Side-Channel Token Based Digital Identity Verification
Sérgio Tenreiro de Magalhães. © 2016. 4 mins.
Analogical Token Based Digital Authentication
Sérgio Tenreiro de Magalhães. © 2016. 9 mins.
Taxonomies
Sérgio Tenreiro de Magalhães. © 2016. 9 mins.
Collaborative Technologies
Sérgio Tenreiro de Magalhães. © 2016. 12 mins.
Stealth Technologies
Sérgio Tenreiro de Magalhães. © 2016. 8 mins.
Cognitive Biometric Technologies
Sérgio Tenreiro de Magalhães. © 2016. 9 mins.
Continual Verification
Sérgio Tenreiro de Magalhães. © 2016. 6 mins.
Behavioral Based Technologies for Enhancement of Login/Password Systems
Sérgio Tenreiro de Magalhães, Vítor J. Sá. © 2015. 9 pages.
Exploring Psychedelic Trance and Electronic Dance Music in Modern Culture
Emília Simão, Armando Malheiro da Silva, Sérgio Tenreiro de Magalhães. © 2015. 379 pages.
The popularization and cult-like following of electronic music has provoked new relations between men and machines, art and technology, and modern shamans and disc jockeys. New...
Psychedelic Trance and Multimedia Neo-Rituals: The Modern Shamanic Tools?
Emília Simão, Sérgio Tenreiro de Magalhães. © 2015. 22 pages.
This chapter examines the relevance of multimedia technologies in Psychedelic Trance gatherings, exploring its technical, sensory and spiritual convergence. Technology devices...
Psychedelic Trance on the Web: Exploring Digital Parties at Second Life
Emília Simão, Sérgio Tenreiro de Magalhães, Armando Malheiro da Silva. © 2015. 23 pages.
This chapter proposes an approach about Psychedelic Trance tribe behaviours and manifestations in digital environments, and cyber ritual dynamics beyond the virtual parties in...
Requirements of a Digital Platform for Psytrance Parties
Sérgio Tenreiro de Magalhães. © 2015. 14 pages.
Digital platforms that support virtual worlds are becoming more complex and there is a growing fusion between real life and digital objects. Wireless technologies, screens'...
Keystroke Dynamics and Graphical Authentication Systems
Sérgio Tenreiro de Magalhães, Henrique M.D. Santos, Leonel Duarte dos Santos, Kenneth Revett. © 2009. 6 pages.
In information systems, authentication involves, traditionally, sharing a secret with the authenticating entity and presenting it whenever a confirmation of the user’s identity...
Using Technology to Overcome the Password's Contradiction
Sérgio Tenreiro de Magalhães, Kenneth Revett, Henrique M.D. Santos, Leonel Duarte dos Santos, André Oliveira, César Ariza. © 2009. 17 pages.
The traditional approach to security has been the use of passwords. They provide the system with a barrier to access what was quite safe in the analogical world. The digital era...