


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 14
Volume 14, Number 1, January - February 2017
- Elisa Bertino:

The State of the Journal Editorial. 1 - Hossein Pilaram

, Taraneh Eghlidos:
An Efficient Lattice Based Multi-Stage Secret Sharing Scheme. 2-8 - Yuan Zhang, Qingjun Chen

, Sheng Zhong:
Efficient and Privacy-Preserving Min and kth Min Computations in Mobile Sensing Systems. 9-21 - Christoph Borchert, Horst Schirmeier

, Olaf Spinczyk:
Generic Soft-Error Detection and Correction for Concurrent Data Structures. 22-36 - Wooguil Pak, Young-June Choi:

High Performance and High Scalable Packet Classification Algorithm for Network Security Systems. 37-49 - Javier Cámara, Rogério de Lemos, Nuno Laranjeiro

, Rafael Ventura, Marco Vieira
:
Robustness-Driven Resilience Evaluation of Self-Adaptive Software Systems. 50-64 - Charles Herder, Ling Ren, Marten van Dijk

, Meng-Day (Mandel) Yu, Srinivas Devadas:
Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions. 65-82 - Chunhua Su, Bagus Santoso

, Yingjiu Li, Robert H. Deng
, Xinyi Huang:
Universally Composable RFID Mutual Authentication. 83-94 - Yi Han

, Jeffrey Chan
, Tansu Alpcan, Christopher Leckie
:
Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing. 95-108
Volume 14, Number 2, March - April 2017
- Adel El-Atawy, Qi Duan

, Ehab Al-Shaer:
A Novel Class of Robust Covert Channels Using Out-of-Order Packets. 116-129 - AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot

:
CPV: Delay-Based Location Verification for the Internet. 130-144 - Hyungon Moon, Hojoon Lee, Ingoo Heo, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang:

Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping. 145-157 - Andrei Homescu, Todd Jackson, Stephen Crane, Stefan Brunthaler

, Per Larsen, Michael Franz:
Large-Scale Automated Software Diversity - Program Evolution Redux. 158-171 - James W. Anderson, Hein Meling, Alexander Rasmussen, Amin Vahdat, Keith Marzullo:

Local Recovery for High Availability in Strongly Consistent Cloud Services. 172-184 - Jingwei Li

, Anna Cinzia Squicciarini
, Dan Lin, Smitha Sundareswaran, Chunfu Jia:
MMBcloud-Tree: Authenticated Index for Verifiable Cloud Service Selection. 185-198 - Kaihe Xu, Yuanxiong Guo

, Linke Guo, Yuguang Fang
, Xiaolin Li:
My Privacy My Decision: Control of Photo Sharing on Online Social Networks. 199-210 - Fuchun Guo

, Yi Mu, Willy Susilo
, Homer Hsing, Duncan S. Wong, Vijay Varadharajan
:
Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. 211-220 - Mohammad Ashiqur Rahman

, Mohammad Hossein Manshaei, Ehab Al-Shaer, Mohamed Shehab
:
Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids. 221-234
Volume 14, Number 3, May - June 2017
- Kim-Kwang Raymond Choo

, Mehran Mozaffari Kermani
, Reza Azarderakhsh, Manimaran Govindarasu:
Emerging Embedded and Cyber Physical System Security Challenges and Innovations. 235-236 - Zhe Liu

, Xinyi Huang, Zhi Hu, Muhammad Khurram Khan
, Hwajeong Seo, Lu Zhou:
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age. 237-248 - Fahimeh Rezaei, Michael Hempel

, Hamid Sharif:
Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic. 249-264 - Ujjwal Guin

, Swarup Bhunia
, Domenic Forte
, Mark Tehranipoor:
SMA: A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware. 265-278 - Vittorio P. Illiano

, Luis Muñoz-González
, Emil C. Lupu:
Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks. 279-293 - Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong:

A Traceback Attack on Freenet. 294-307 - Raphaël Barazzutti, Pascal Felber

, Hugues Mercier, Emanuel Onica
, Etienne Rivière:
Efficient and Confidentiality-Preserving Content-Based Publish/Subscribe with Prefiltering. 308-325 - Yogachandran Rahulamathavan

, Muttukrishnan Rajarajan:
Efficient Privacy-Preserving Facial Expression Classification. 326-338 - Ehab S. Elmallah, Mohamed G. Gouda:

Hardness of Firewall Analysis. 339-349
Volume 14, Number 4, July - August 2017
- Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng

:
A Secure, Usable, and Transparent Middleware for Permission Managers on Android. 350-362 - Md. Zakirul Alam Bhuiyan

, Guojun Wang, Jie Wu, Jiannong Cao
, Xuefeng Liu, Tian Wang:
Dependable Structural Health Monitoring Using Wireless Sensor Networks. 363-376 - Hongbo Liu

, Yingying Chen
, Mooi Choo Chuah, Jie Yang, H. Vincent Poor
:
Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching. 377-391 - Marco Tiloca, Domenico De Guglielmo, Gianluca Dini, Giuseppe Anastasi, Sajal K. Das

:
JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs. 392-405 - Yao Zheng

, Ming Li, Wenjing Lou, Y. Thomas Hou
:
Location Based Handshake and Private Proximity Test with Location Tags. 406-419 - Khaled Rabieh, Mohamed M. E. A. Mahmoud, Kemal Akkaya, Samet Tonyali

:
Scalable Certificate Revocation Schemes for Smart Grid AMI Networks Using Bloom Filters. 420-432 - Brian Krupp

, Nigamanth Sridhar, Wenbing Zhao:
SPE: Security and Privacy Enhancement Framework for Mobile Devices. 433-446 - Manuel Egele, Gianluca Stringhini

, Christopher Kruegel, Giovanni Vigna:
Towards Detecting Compromised Accounts on Social Networks. 447-460 - Hu Xiong, Jianfei Sun:

Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing". 461-462
Volume 14, Number 5, September - October 2017
- Slawomir Goryczka, Li Xiong

:
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy. 463-477 - Basit Shafiq, Sameera Ghayyur, Ammar Masood, Zahid Pervaiz

, Abdulrahman Almutairi, M. Farrukh Khan, Arif Ghafoor:
Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment. 478-493 - Qi Li, Ravi S. Sandhu, Xinwen Zhang, Mingwei Xu:

Mandatory Content Access Control for Privacy Protection in Information Centric Networks. 494-506 - Ji Zhang, Hongzhou Li, Xuemei Liu, Yonglong Luo, Fulong Chen, Hua Wang

, Liang Chang:
On Efficient and Robust Anonymization for Privacy Protection on Massive Streaming Categorical Information. 507-520 - Polina Zilberman, Rami Puzis

, Yuval Elovici:
On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers. 521-534 - Yacin Nadji, Roberto Perdisci

, Manos Antonakakis:
Still Beheading Hydras: Botnet Takedowns Then and Now. 535-549 - Shouling Ji

, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, Raheem A. Beyah
:
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords. 550-564 - Tassos Dimitriou, Ghassan O. Karame:

Enabling Anonymous Authorization and Rewarding in the Smart Grid. 565-572 - SeongHan Shin, Kazukuni Kobara:

Security Analysis of Password-Authenticated Key Retrieval. 573-576
Volume 14, Number 6, November - December 2017
- Elisa Bertino:

Editor's Note. 577 - Peng Zhang, Qi Li, Patrick P. C. Lee

:
Achieving Content-Oriented Anonymity with CRISP. 578-590 - Pietro Colombo

, Elena Ferrari
:
Enhancing MongoDB with Purpose-Based Access Control. 591-604 - Reza Azarderakhsh, Dieter Fishbein, Gurleen Grewal, Shi Hu, David Jao

, Patrick Longa, Rajeev Verma:
Fast Software Implementations of Bilinear Pairings. 605-619 - George Bissias, Brian Neil Levine, Marc Liberatore, Swagatika Prusty:

Forensic Identification of Anonymous Sources in OneSwarm. 620-632 - Alptekin Küpçü

:
Incentivized Outsourced Computation Resistant to Malicious Contractors. 633-649 - Zequ Yang, Peng Cheng, Jiming Chen:

Learning-Based Jamming Attack against Low-Duty-Cycle Networks. 650-663 - Marco Bonola, Giuseppe Bianchi, Giulio Picierro

, Salvatore Pontarelli, Marco Monaci:
StreaMon: A Data-Plane Programming Abstraction for Software-Defined Stream Monitoring. 664-678 - Hui Ma

, Rui Zhang, Zhiguo Wan, Yao Lu, Suqing Lin:
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. 679-692 - Marc Joye:

Cryptanalysis of a Privacy-Preserving Aggregation Protocol. 693-694

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














