default search action
IEEE Transactions on Dependable and Secure Computing, Volume 14
Volume 14, Number 1, January - February 2017
- Elisa Bertino:
The State of the Journal Editorial. 1 - Hossein Pilaram, Taraneh Eghlidos:
An Efficient Lattice Based Multi-Stage Secret Sharing Scheme. 2-8 - Yuan Zhang, Qingjun Chen, Sheng Zhong:
Efficient and Privacy-Preserving Min and kth Min Computations in Mobile Sensing Systems. 9-21 - Christoph Borchert, Horst Schirmeier, Olaf Spinczyk:
Generic Soft-Error Detection and Correction for Concurrent Data Structures. 22-36 - Wooguil Pak, Young-June Choi:
High Performance and High Scalable Packet Classification Algorithm for Network Security Systems. 37-49 - Javier Cámara, Rogério de Lemos, Nuno Laranjeiro, Rafael Ventura, Marco Vieira:
Robustness-Driven Resilience Evaluation of Self-Adaptive Software Systems. 50-64 - Charles Herder, Ling Ren, Marten van Dijk, Meng-Day (Mandel) Yu, Srinivas Devadas:
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions. 65-82 - Chunhua Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, Xinyi Huang:
Universally Composable RFID Mutual Authentication. 83-94 - Yi Han, Jeffrey Chan, Tansu Alpcan, Christopher Leckie:
Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing. 95-108
Volume 14, Number 2, March - April 2017
- Adel El-Atawy, Qi Duan, Ehab Al-Shaer:
A Novel Class of Robust Covert Channels Using Out-of-Order Packets. 116-129 - AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot:
CPV: Delay-Based Location Verification for the Internet. 130-144 - Hyungon Moon, Hojoon Lee, Ingoo Heo, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang:
Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping. 145-157 - Andrei Homescu, Todd Jackson, Stephen Crane, Stefan Brunthaler, Per Larsen, Michael Franz:
Large-Scale Automated Software Diversity - Program Evolution Redux. 158-171 - James W. Anderson, Hein Meling, Alexander Rasmussen, Amin Vahdat, Keith Marzullo:
Local Recovery for High Availability in Strongly Consistent Cloud Services. 172-184 - Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia:
MMBcloud-Tree: Authenticated Index for Verifiable Cloud Service Selection. 185-198 - Kaihe Xu, Yuanxiong Guo, Linke Guo, Yuguang Fang, Xiaolin Li:
My Privacy My Decision: Control of Photo Sharing on Online Social Networks. 199-210 - Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan:
Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. 211-220 - Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer, Mohamed Shehab:
Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids. 221-234
Volume 14, Number 3, May - June 2017
- Kim-Kwang Raymond Choo, Mehran Mozaffari Kermani, Reza Azarderakhsh, Manimaran Govindarasu:
Emerging Embedded and Cyber Physical System Security Challenges and Innovations. 235-236 - Zhe Liu, Xinyi Huang, Zhi Hu, Muhammad Khurram Khan, Hwajeong Seo, Lu Zhou:
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age. 237-248 - Fahimeh Rezaei, Michael Hempel, Hamid Sharif:
Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic. 249-264 - Ujjwal Guin, Swarup Bhunia, Domenic Forte, Mark M. Tehranipoor:
SMA: A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware. 265-278 - Vittorio P. Illiano, Luis Muñoz-González, Emil C. Lupu:
Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks. 279-293 - Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong:
A Traceback Attack on Freenet. 294-307 - Raphaël Barazzutti, Pascal Felber, Hugues Mercier, Emanuel Onica, Etienne Rivière:
Efficient and Confidentiality-Preserving Content-Based Publish/Subscribe with Prefiltering. 308-325 - Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
Efficient Privacy-Preserving Facial Expression Classification. 326-338 - Ehab S. Elmallah, Mohamed G. Gouda:
Hardness of Firewall Analysis. 339-349
Volume 14, Number 4, July - August 2017
- Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng:
A Secure, Usable, and Transparent Middleware for Permission Managers on Android. 350-362 - Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Jiannong Cao, Xuefeng Liu, Tian Wang:
Dependable Structural Health Monitoring Using Wireless Sensor Networks. 363-376 - Hongbo Liu, Yingying Chen, Mooi Choo Chuah, Jie Yang, H. Vincent Poor:
Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching. 377-391 - Marco Tiloca, Domenico De Guglielmo, Gianluca Dini, Giuseppe Anastasi, Sajal K. Das:
JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs. 392-405 - Yao Zheng, Ming Li, Wenjing Lou, Y. Thomas Hou:
Location Based Handshake and Private Proximity Test with Location Tags. 406-419 - Khaled Rabieh, Mohamed M. E. A. Mahmoud, Kemal Akkaya, Samet Tonyali:
Scalable Certificate Revocation Schemes for Smart Grid AMI Networks Using Bloom Filters. 420-432 - Brian Krupp, Nigamanth Sridhar, Wenbing Zhao:
SPE: Security and Privacy Enhancement Framework for Mobile Devices. 433-446 - Manuel Egele, Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna:
Towards Detecting Compromised Accounts on Social Networks. 447-460 - Hu Xiong, Jianfei Sun:
Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing". 461-462
Volume 14, Number 5, September - October 2017
- Slawomir Goryczka, Li Xiong:
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy. 463-477 - Basit Shafiq, Sameera Ghayyur, Ammar Masood, Zahid Pervaiz, Abdulrahman Almutairi, M. Farrukh Khan, Arif Ghafoor:
Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment. 478-493 - Qi Li, Ravi S. Sandhu, Xinwen Zhang, Mingwei Xu:
Mandatory Content Access Control for Privacy Protection in Information Centric Networks. 494-506 - Ji Zhang, Hongzhou Li, Xuemei Liu, Yonglong Luo, Fulong Chen, Hua Wang, Liang Chang:
On Efficient and Robust Anonymization for Privacy Protection on Massive Streaming Categorical Information. 507-520 - Polina Zilberman, Rami Puzis, Yuval Elovici:
On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers. 521-534 - Yacin Nadji, Roberto Perdisci, Manos Antonakakis:
Still Beheading Hydras: Botnet Takedowns Then and Now. 535-549 - Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, Raheem A. Beyah:
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords. 550-564 - Tassos Dimitriou, Ghassan O. Karame:
Enabling Anonymous Authorization and Rewarding in the Smart Grid. 565-572 - SeongHan Shin, Kazukuni Kobara:
Security Analysis of Password-Authenticated Key Retrieval. 573-576
Volume 14, Number 6, November - December 2017
- Elisa Bertino:
Editor's Note. 577 - Peng Zhang, Qi Li, Patrick P. C. Lee:
Achieving Content-Oriented Anonymity with CRISP. 578-590 - Pietro Colombo, Elena Ferrari:
Enhancing MongoDB with Purpose-Based Access Control. 591-604 - Reza Azarderakhsh, Dieter Fishbein, Gurleen Grewal, Shi Hu, David Jao, Patrick Longa, Rajeev Verma:
Fast Software Implementations of Bilinear Pairings. 605-619 - George Bissias, Brian Neil Levine, Marc Liberatore, Swagatika Prusty:
Forensic Identification of Anonymous Sources in OneSwarm. 620-632 - Alptekin Küpçü:
Incentivized Outsourced Computation Resistant to Malicious Contractors. 633-649 - Zequ Yang, Peng Cheng, Jiming Chen:
Learning-Based Jamming Attack against Low-Duty-Cycle Networks. 650-663 - Marco Bonola, Giuseppe Bianchi, Giulio Picierro, Salvatore Pontarelli, Marco Monaci:
StreaMon: A Data-Plane Programming Abstraction for Software-Defined Stream Monitoring. 664-678 - Hui Ma, Rui Zhang, Zhiguo Wan, Yao Lu, Suqing Lin:
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. 679-692 - Marc Joye:
Cryptanalysis of a Privacy-Preserving Aggregation Protocol. 693-694
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.