default search action
IEEE Transactions on Dependable and Secure Computing, Volume 12
Volume 12, Number 1, January - February 2015
- Yuhui Zhong, Bharat K. Bhargava, Yi Lu, Pelin Angin:
A Computational Dynamic Trust Model for User Authorization. 1-15 - Robert Mitchell, Ing-Ray Chen:
Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems. 16-30 - Zhuo Lu, Wenye Wang, Cliff Wang:
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming. 31-44 - Taeho Jung, Xiang-Yang Li, Meng Wan:
Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel. 45-57 - Sisi Duan, Sean Peisert, Karl N. Levitt:
hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost. 58-70 - Pullamsetty Harika, Marreddy Nagajyothi, John C. John, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Meeting Cardinality Constraints in Role Mining. 71-84 - Tat Wing Chim, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui, Jin Zhong:
PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication of Power Usage Information for Smart Grid. 85-97 - Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha:
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. 98-110 - Rui Zhang, Jingchao Sun, Yanchao Zhang, Chi Zhang:
Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers. 111-124
Volume 12, Number 2, March - April 2015
- Elisa Bertino:
The State of the Journal Editorial. 135 - Goran Delac, Marin Silic, Sinisa Srbljic:
A Reliability Improvement Method for SOA-Based Applications. 136-149 - Bilal Shebaro, Oyindamola Oluwatimi, Elisa Bertino:
Context-Based Access Control Systems for Mobile Devices. 150-163 - Hisham A. Kholidy, Fabrizio Baiardi, Salim Hariri:
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks. 164-178 - David Megías:
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints. 179-189 - Siru Ni, Yi Zhuang, Zining Cao, Xiangying Kong:
Modeling Dependability Features for Real-Time Embedded Systems. 190-203 - Reza Entezari-Maleki, Kishor S. Trivedi, Ali Movaghar:
Performability Evaluation of Grid Environments Using Stochastic Reward Nets. 204-216 - Ousmane Amadou Dia, Csilla Farkas:
Risk Aware Query Replacement Approach for Secure Databases Performance Management. 217-229 - Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou:
Secure Tag Search in RFID Systems Using Mobile Readers. 230-242 - Long Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Arun Iyengar:
VM-μCheckpoint: Design, Modeling, and Assessment of Lightweight In-Memory VM Checkpointing. 243-255
Volume 12, Number 3, May - June 2015
- Salmin Sultana, Gabriel Ghinita, Elisa Bertino, Mohamed Shehab:
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks. 256-269 - Andrea Ceccarelli, Leonardo Montecchi, Francesco Brancati, Paolo Lollini, Angelo Marguglio, Andrea Bondavalli:
Continuous and Transparent User Identity Verification for Secure Internet Services. 270-283 - Michael Le, Yuval Tamir:
Fault Injection in Virtualized Systems - Challenges and Applications. 284-297 - Qi Li, Xinwen Zhang, Xin Zhang, Purui Su:
Invalidating Idealized BGP Security Proposals and Countermeasures. 298-311 - Juan E. Tapiador, Agustín Orfila, Arturo Ribagorda, Benjamín Ramos:
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System. 312-325 - Aditi Gupta, Javid Habibi, Michael S. Kirkpatrick, Elisa Bertino:
Marlin: Mitigating Code Reuse Attacks Using Code Randomization. 326-337 - Alex P. Klinkhamer, Ali Ebnenasir:
On the Hardness of Adding Nonmasking Fault Tolerance. 338-350 - Sisi Liu, Loukas Lazos, Marwan Krunz:
Time-Delayed Broadcasting for Defeating Inside Jammers. 351-365 - Antonio Bovenzi, Francesco Brancati, Stefano Russo, Andrea Bondavalli:
An OS-level Framework for Anomaly Detection in Complex Software Systems. 366-372 - Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi:
On the Security of A Privacy-Preserving Product Calculation Scheme. 373-374
Volume 12, Number 4, July - August 2015
- Chin-Hsien Wu, Po-Han Wu, Kuo-Long Chen, Wen-Yen Chang, Kun-Cheng Lai:
A Hotness Filter of Files for Reliable Non-Volatile Memory Systems. 375-386 - Dongkyun Ahn, Gyungho Lee:
A Memory-Access Validation Scheme against Payload Injection Attacks. 387-399 - Lei Cen, Christopher S. Gates, Luo Si, Ninghui Li:
A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code. 400-412 - Linke Guo, Chi Zhang, Yuguang Fang:
A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks. 413-427 - Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu:
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment. 428-442 - Phu H. Phung, Maliheh Monshizadeh, Meera Sridhar, Kevin W. Hamlen, V. N. Venkatakrishnan:
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content. 443-457 - Jia-Dong Zhang, Chi-Yin Chow:
REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks. 458-471 - Robbert van Renesse, Nicolas Schiper, Fred B. Schneider:
Vive La Différence: Paxos vs. Viewstamped Replication vs. Zab. 472-484 - Massimo Cafaro, Roberto Civino, Barbara Masucci:
On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting. 485-490
Volume 12, Number 5, September - October 2015
- Tilo Müller, Felix C. Freiling:
A Systematic Assessment of the Security of Full Disk Encryption. 491-503 - Yuan Hong, Jaideep Vaidya, Haibing Lu, Panagiotis Karras, Sanjay Goel:
Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility. 504-518 - Sakthi Vignesh Radhakrishnan, A. Selcuk Uluagac, Raheem A. Beyah:
GTID: A Technique for Physical Device and Device Type Fingerprinting. 519-532 - Zhongyuan Xu, Scott D. Stoller:
Mining Attribute-Based Access Control Policies. 533-545 - Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou:
New Publicly Verifiable Databases with Efficient Updates. 546-556 - Aravind Prakash, Eknath Venkataramani, Heng Yin, Zhiqiang Lin:
On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution. 557-570 - Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu:
Towards Automated Risk Assessment and Mitigation of Mobile Applications. 571-584 - Benjamin W. P. Ramsey, Barry E. Mullins, Michael A. Temple, Michael R. Grimaila:
Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation. 585-596
Volume 12, Number 6, November - December 2015
- Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir:
Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes. 602-614 - Xixiang Lv, Yi Mu, Hui Li:
Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs. 615-625 - Hannes Holm, Khurram Shahzad, Markus Buschle, Mathias Ekstedt:
P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language. 626-639 - Wilko Henecka, Matthew Roughan:
Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases. 640-651 - Tilman Wolf, Harikrishnan Kumarapillai Chandrikakutty, Kekai Hu, Deepak Unnikrishnan, Russell Tessier:
Securing Network Processors with High-Performance Hardware Monitors. 652-664 - Ahmed Bendahmane, Mohamed Essaaidi, Ahmed El Moussaoui, Ali Younes:
The Effectiveness of Reputation-Based Voting for Collusion Tolerance in Large-Scale Grids. 665-674 - Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, Yongdae Kim:
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures. 675-687 - Lwin Khin Shar, Lionel C. Briand, Hee Beng Kuan Tan:
Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning. 688-707
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.