default search action
IEEE Transactions on Dependable and Secure Computing, Volume 16
Volume 16, Number 1, January - February 2019
- Jaideep Vaidya:
Editorial. 1-4 - Satyajayant Misra, Reza Tourani, Frank Natividad, Travis Mick, Nahid Ebrahimi Majd, Hong Huang:
AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge. 5-17 - Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, Marten van Dijk:
Advancing the State-of-the-Art in Hardware Trojans Detection. 18-32 - Erman Ayday, Qiang Tang, Arif Yilmaz:
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data. 33-43 - Xiaoguang Wang, Yong Qi, Zhi Wang, Yue Chen, Yajin Zhou:
Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems. 44-57 - Aaron S. Pope, Daniel R. Tauritz, Alexander D. Kent:
Evolving Bipartite Authentication Graph Partitions. 58-71 - Yannan Li, Yong Yu, Geyong Min, Willy Susilo, Jianbing Ni, Kim-Kwang Raymond Choo:
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems. 72-83 - Nathalie Baracaldo, Balaji Palanisamy, James Joshi:
G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework. 84-98 - Tobias Wüchner, Aleksander Cislak, Martín Ochoa, Alexander Pretschner:
Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection. 99-112 - Yingyuan Yang, Jinyuan Sun, Linke Guo:
PersonaIA: A Lightweight Implicit Authentication System Based on Customized User Behavior Selection. 113-126 - Yongwang Zhao, David Sanán, Fuyuan Zhang, Yang Liu:
Refinement-Based Specification and Security Analysis of Separation Kernels. 127-141 - Tianbo Wang, Chunhe Xia, Sheng Wen, Hui Xue, Yang Xiang, Shouzhong Tu:
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks. 142-155 - Chenglu Jin, Marten van Dijk:
Secure and Efficient Initialization and Authentication Protocols for SHIELD. 156-173 - Muffy Calder, Michele Sevegnani:
Stochastic Model Checking for Predicting Component Failures and Service Availability. 174-187
Volume 16, Number 2, March - April 2019
- Dimitris Mitropoulos, Panos Louridas, Michalis Polychronakis, Angelos Dennis Keromytis:
Defending Against Web Application Attacks: Approaches, Challenges and Implications. 188-203 - Ling Ren, Christopher W. Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas:
Design and Implementation of the Ascend Secure Processor. 204-216 - Martine De Cock, Rafael Dowsley, Caleb Horst, Raj S. Katti, Anderson C. A. Nascimento, Wing-Sea Poon, Stacey Truex:
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation. 217-230 - Luis Munoz-Gonzalez, Daniele Sgandurra, Martín Barrère, Emil C. Lupu:
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs. 231-244 - Boyang Wang, Ming Li, Li Xiong:
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data. 245-258 - Dong Xiang, Bing Li, Yi Fu:
Fault-Tolerant Adaptive Routing in Dragonfly Networks. 259-271 - Xiao Lan, Jing Xu, Zhenfeng Zhang, Wen-Tao Zhu:
Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3. 272-286 - Hojoon Lee, Hyungon Moon, Ingoo Heo, DaeHee Jang, Jinsoo Jang, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang:
KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object. 287-300 - Gregory Levitin, Liudong Xing, Yuanshun Dai:
Optimal Spot-Checking for Collusion Tolerance in Computer Grids. 301-312 - Gergely Ács, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik, Christopher A. Wood:
Privacy-Aware Caching in Information-Centric Networking. 313-328 - Emre Yilmaz, Hakan Ferhatosmanoglu, Erman Ayday, Remzi Can Aksoy:
Privacy-Preserving Aggregate Queries for Optimal Location Selection. 329-343 - Xiaofeng Ding, Peng Liu, Hai Jin:
Privacy-Preserving Multi-Keyword Top-$k$ k Similarity Search Over Encrypted Data. 344-357 - Ranjan Pal, Leana Golubchik, Konstantinos Psounis, Pan Hui:
Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets. 358-372
Volume 16, Number 3, May - June 2019
- Chip-Hong Chang, Marten van Dijk, Ulrich Rührmair, Mark M. Tehranipoor:
Emerging Attacks and Solutions for Secure Hardware in the Internet of Things. 373-375 - Ali Akbar Pammu, Kwen-Siong Chong, Yi Wang, Bah-Hwee Gwee:
A Highly Efficient Side Channel Attack with Profiling through Relevance-Learning on Physical Leakage Information. 376-387 - Bilgiday Yuce, Chinmay Deshpande, Marjan Ghodrati, Abhishek Bendre, Leyla Nazhandali, Patrick Schaumont:
A Secure Exception Mode for Fault-Attack-Resistant Processing. 388-401 - Qian Wang, Gang Qu:
A Silicon PUF Based Entropy Pump. 402-414 - Pieter Maene, Johannes Götzfried, Tilo Müller, Ruan de Clercq, Felix C. Freiling, Ingrid Verbauwhede:
Atlas: Application Confidentiality in Compromised Embedded Systems. 415-423 - Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu:
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database. 424-437 - Le Guan, Chen Cao, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. 438-453 - Wei Li, Linfeng Liao, Dawu Gu, Chaoyun Li, Chenyu Ge, Zheng Guo, Ya Liu, Zhiqiang Liu:
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things. 454-461 - André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Boris Skoric, Stefan Katzenbeisser, Jakub Szefer:
Decay-Based DRAM PUFs in Commodity Devices. 462-475 - Huiyun Li, Cuiping Shao, Zheng Wang:
Detecting Fault Injection Attacks Based on Compressed Sensing and Integer Linear Programming. 476-483 - Yiran Shen, Hongkai Wen, Chengwen Luo, Weitao Xu, Tao Zhang, Wen Hu, Daniela Rus:
GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait. 484-497 - Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar:
HAL - The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion. 498-510 - Hila Rabii, Yaara Neumeier, Osnat Keren:
High Rate Robust Codes with Low Implementation Complexity. 511-520 - Zhe Liu, Hwajeong Seo, Aniello Castiglione, Kim-Kwang Raymond Choo, Howon Kim:
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things. 521-529 - S. Abhishek Anand, Nitesh Saxena:
Noisy Vibrational Pairing of IoT Devices. 530-545
Volume 16, Number 4, July - August 2019
- Vasileios Karyotis:
A Markov Random Field Framework for Modeling Malware Propagation in Complex Communications Networks. 551-564 - Jonathan Chase, Dusit Niyato, Ping Wang, Sivadon Chaisiri, Ryan K. L. Ko:
A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing. 565-579 - Yuichi Sei, Hiroshi Okumura, Takao Takenouchi, Akihiko Ohsuga:
Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness. 580-593 - Shouling Ji, Ting Wang, Jianhai Chen, Weiqing Li, Prateek Mittal, Raheem Beyah:
De-SAG: On the De-Anonymization of Structure-Attribute Graph Data. 594-607 - Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong:
Efficient Delegated Private Set Intersection on Outsourced Private Datasets. 608-624 - Rui Zhang, Yuting Xiao, Shuzhou Sun, Hui Ma:
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications. 625-634 - Guido Lena Cota, Sonia Ben Mokhtar, Gabriele Gianini, Ernesto Damiani, Julia Lawall, Gilles Muller, Lionel Brunie:
RACOON++: A Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems. 635-650 - Hamed Farbeh, Fereshte Mozafari, Masoume Zabihi, Seyed Ghassem Miremadi:
RAW-Tag: Replicating in Altered Cache Ways for Correcting Multiple-Bit Errors in Tag Array. 651-664 - Chongxi Bao, Ankur Srivastava:
Reducing Timing Side-Channel Information Leakage Using 3D Integration. 665-678 - Jianwei Qian, Xiang-Yang Li, Chunhong Zhang, Linlin Chen, Taeho Jung, Junze Han:
Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model. 679-692 - Cai Fu, Xiao-Yang Liu, Jia Yang, Laurence T. Yang, Shui Yu, Tianqing Zhu:
Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks. 693-710 - Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli:
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. 711-724 - Fang-Yu Rao:
On the Security of a Variant of ElGamal Encryption Scheme. 725-728
Volume 16, Number 5, September - October 2019
- Raphael C.-W. Phan, Moti Yung:
Paradigm Shifts in Cryptographic Engineering. 729-730 - Russell W. F. Lai, Kam-Fung Cheung, Sherman S. M. Chow, Anthony Man-Cho So:
Another Look at Anonymous Communication. 731-742 - Myungsun Kim, Hyung Tae Lee, San Ling, Benjamin Hong Meng Tan, Huaxiong Wang:
Private Compound Wildcard Queries Using Fully Homomorphic Encryption. 743-756 - Akshima, Donghoon Chang, Aarushi Goel, Sweta Mishra, Somitra Kumar Sanadhya:
Generation of Secure and Reliable Honeywords, Preventing False Detection. 757-769 - Maliheh Shirvanian, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
Building and Studying a Password Store that Perfectly Hides Passwords from Itself. 770-782 - Georg T. Becker:
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory versus Practice. 783-795 - Margarita Osadchy, Orr Dunkelman:
It is All in the System's Parameters: Privacy and Security Issues in Transforming Biometric Raw Data into Binary Strings. 796-804 - Pawel Lorek, Filip Zagórski, Michal Kulis:
Strong Stationary Times and its use in Cryptography. 805-818 - Muhammad Umer Arshad, Muhamad Felemban, Zahid Pervaiz, Arif Ghafoor, Walid G. Aref:
A Privacy Mechanism for Access Controlled Graph Data. 819-832 - Zhenfu Cao, Hongbing Wang, Yunlei Zhao:
AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications. 833-842 - Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:
Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points. 843-855 - Domenico Cotroneo, Andrea Paudice, Antonio Pecchia:
Empirical Analysis and Validation of Security Alerts Filtering Techniques. 856-870 - Mohamed Mahmoud, Khaled Rabieh, Ahmed B. T. Sherif, Enahoro Oriero, Muhammad Ismail, Erchin Serpedin, Khalid A. Qaraqe:
Privacy-Preserving Fine-Grained Data Retrieval Schemes for Mobile Social Networks. 871-884 - Mahmoud Ammar, Bruno Crispo, Bart Jacobs, Danny Hughes, Wilfried Daniels:
SμV - The Security MicroVisor: A Formally-Verified Software-Based Security Architecture for the Internet of Things. 885-901 - Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao:
Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM. 902-912
Volume 16, Number 6, November - December 2019
- Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies. 913-914 - Qi Li, Xiaoyue Zou, Qun Huang, Jing Zheng, Patrick P. C. Lee:
Dynamic Packet Forwarding Verification in SDN. 915-929 - Qingjun Chen, Shouqian Shi, Xin Li, Chen Qian, Sheng Zhong:
SDN-Based Privacy Preserving Cross Domain Routing. 930-943 - Juan Wang, Ru Wen, Jiangqi Li, Fei Yan, Bo Zhao, Fajiang Yu:
Detecting and Mitigating Target Link-Flooding Attacks Using SDN. 944-956 - Wiem Abderrahim, Zièd Choukair:
Dependability Integration in Cloud-hosted Telecommunication Services. 957-968 - Anca Jurcut, Tom Coffey, Reiner Dojen:
A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks. 969-983 - Sancheng Peng, Guojun Wang, Yongmei Zhou, Cong Wan, Cong Wang, Shui Yu, Jianwei Niu:
An Immunization Framework for Social Networks Through Big Data Based Influence Modeling. 984-995 - Jian Shen, Tianqi Zhou, Debiao He, Yuexin Zhang, Xingming Sun, Yang Xiang:
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing. 996-1010 - Sandeep Pisharody, Janakarajan Natarajan, Ankur Chowdhary, Abdullah Alshalan, Dijiang Huang:
Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments. 1011-1025 - Xiaojing Liao, Preethi Srinivasan, David Formby, Raheem A. Beyah:
Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid. 1026-1039 - Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang:
Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures. 1040-1053 - Xiao Han, Hailiang Huang, Leye Wang:
F-PAD: Private Attribute Disclosure Risk Estimation in Online Social Networks. 1054-1069 - Giorgos Kappes, Andromachi Hatzieleftheriou, Stergios V. Anastasiadis:
Multitenant Access Control for Cloud-Aware Distributed Filesystems. 1070-1085 - Limei Lin, Li Xu, Riqing Chen, Sun-Yuan Hsieh, Dajin Wang:
Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks. 1086-1097
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.