default search action
IEEE Transactions on Dependable and Secure Computing, Volume 17
Volume 17, Number 1, January - February 2020
- Jaideep Vaidya:
Editorial. 1 - Andrea De Salve, Roberto Di Pietro, Paolo Mori, Laura Ricci:
A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks. 2-21 - Eyal Itkin, Avishai Wool:
A Security Analysis and Revised Security Extension for the Precision Time Protocol. 22-34 - Jeroen Van Cleemput, Bjorn De Sutter, Koen De Bosschere:
Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks. 35-49 - Wenyuan Xu, Jing Tian, Yu Cao, Song Wang:
Challenge-Response Authentication Using In-Air Handwriting Style Verification. 51-64 - Ke Tian, Danfeng Yao, Barbara G. Ryder, Gang Tan, Guojun Peng:
Detection of Repackaged Android Malware with Code-Heterogeneity Features. 64-77 - Yang Yang, Ximeng Liu, Robert H. Deng, Yingjiu Li:
Lightweight Sharable and Traceable Secure Mobile Health System. 78-91 - Zheng Zheng, Kishor S. Trivedi, Nan Wang, Kun Qiu:
Markov Regenerative Models of WebServers for Their User-Perceived Availability and Bottlenecks. 92-105 - Yanjun Pan, Yantian Hou, Ming Li, Ryan M. Gerdes, Kai Zeng, Md. Asaduzzaman Towfiq, Bedri A. Cetiner:
Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization. 106-120 - Yifeng Zheng, Huayi Duan, Xingliang Yuan, Cong Wang:
Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery. 121-133 - Pilar Holgado, Víctor A. Villagrá, Luis Vázquez:
Real-Time Multistep Attack Prediction Based on Hidden Markov Models. 134-147 - Suhrid Satyal, Ingo Weber, Len Bass, Min Fu:
Rollback Mechanisms for Cloud Management APIs Using AI Planning. 148-161 - Yuan Zhang, Boyu Zhu, Yixin Fang, Suxin Guo, Aidong Zhang, Sheng Zhong:
Secure Inter-Domain Forwarding Loop Test in Software Defined Networks. 162-178 - Linzhi Jiang, Chunxiang Xu, Xiaofang Wang, Bo Luo, Huaqun Wang:
Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain. 179-193 - Ali Inan, Mehmet Emre Gursoy, Yücel Saygin:
Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms. 194-207 - Wei You, Bin Liang, Wenchang Shi, Peng Wang, Xiangyu Zhang:
TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices. 209-222
Volume 17, Number 2, March - April 2020
- Boxiang Dong, Hui Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo:
Authenticated Outlier Mining for Outsourced Databases. 222-235 - Zhikun Zhang, Heng Zhang, Shibo He, Peng Cheng:
Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks. 236-247 - Zhirong Shen, Patrick P. C. Lee, Jiwu Shu, Wenzhong Guo:
Cross-Rack-Aware Single Failure Recovery for Clustered File Systems. 248-261 - Tanmoy Chakraborty, Fabio Pierazzi, V. S. Subrahmanian:
EC2: Ensemble Clustering and Classification for Predicting Android Malware Families. 262-277 - Andreas Walz, Axel Sikora:
Exploiting Dissent: Towards Fuzzing-Based Differential Black-Box Testing of TLS Implementations. 278-291 - Keita Emura, Takuya Hayashi, Ai Ishida:
Group Signatures with Time-Bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation. 292-305 - Li Lu, Lingshuang Liu, Muhammad Jawad Hussain, Yongshuai Liu:
I Sense You by Breath: Speaker Recognition via Breath Biometrics. 306-319 - Yang Yang, Ximeng Liu, Robert H. Deng:
Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language. 320-334 - Chao Shen, Yufei Chen, Xiaohong Guan, Roy A. Maxion:
Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System. 335-349 - Huaxin Li, Qingrong Chen, Haojin Zhu, Di Ma, Hong Wen, Xuemin Sherman Shen:
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks. 350-362 - Wenxiu Ding, Zheng Yan, Robert H. Deng:
Privacy-Preserving Data Processing with Flexible Access Control. 363-376 - Luigi Catuogno, Clemente Galdi, Giuseppe Persiano:
Secure Dependency Enforcement in Package Management Systems. 377-390 - Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Willy Susilo:
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. 391-406 - Weili Han, Chang Cao, Hao Chen, Dong Li, Zheran Fang, Wenyuan Xu, X. Sean Wang:
senDroid: Auditing Sensor Access in Android System-Wide. 407-421 - Nahid Juma, Jonathan Shahen, Khalid Zaman Bijon, Mahesh Tripunitara:
The Overhead from Combating Side-Channels in Cloud Systems Using VM-Scheduling. 422-435 - Tara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk:
Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory. 436-442 - Emre Kaplan, Mehmet Emre Gursoy, Mehmet Ercan Nergiz, Yücel Saygin:
Known Sample Attacks on Relation Preserving Data Transformations. 443-450
Volume 17, Number 3, May - June 2020
- Mohammad Ashiqur Rahman, Amarjit Datta:
Impact of Stealthy Attacks on Optimal Power Flow: A Simulink-Driven Formal Analysis. 451-464 - P. V. Rajkumar, Ravi S. Sandhu:
Safety Decidability for Pre-Authorization Usage Control with Identifier Attribute Domains. 465-478 - Xiaonan Zhu, Jinku Li, Yajin Zhou, Jianfeng Ma:
AdCapsule: Practical Confinement of Advertisements in Android Applications. 479-492 - Igor Kaitovic, Miroslaw Malek:
Impact of Failure Prediction on Availability: Modeling and Comparative Analysis of Predictive and Reactive Methods. 493-505 - Masoud Narouei, Hassan Takabi, Rodney Nielsen:
Automatic Extraction of Access Control Policies from Natural Language Documents. 506-517 - Peter F. Klemperer, Hye Yoon Jeon, Bryan D. Payne, James C. Hoe:
High-Performance Memory Snapshotting for Real-Time, Consistent, Hypervisor-Based Monitors. 518-535 - Zhe Liu, Patrick Longa, Geovandro C. C. F. Pereira, Oscar Reparaz, Hwajeong Seo:
Four$\mathbb {Q}$Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks. 536-549 - Neetesh Saxena, Hong Shen, Nikos Komninos, Kim-Kwang Raymond Choo, Narendra S. Chaudhari:
BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users. 550-565 - Christian Esposito, Massimo Ficco, Aniello Castiglione, Francesco Palmieri, Alfredo De Santis:
Distributed Group Key Management for Event Notification Confidentiality Among Sensors. 566-580 - Jianbing Ni, Kuan Zhang, Yong Yu, Xiaodong Lin, Xuemin Sherman Shen:
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing. 581-594 - Yonggang Huang, Jun Zhang, Lei Pan, Yang Xiang:
Privacy Protection in Interactive Content Based Image Retrieval. 595-607 - Yue Zhang, Jia Yu, Rong Hao, Cong Wang, Kui Ren:
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data. 608-619 - Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael B. Abu-Ghazaleh, Dmitry Ponomarev:
EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers. 620-633 - Lei Zhang, Xinyu Meng, Kim-Kwang Raymond Choo, Yuanfei Zhang, Feifei Dai:
Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud. 634-647 - An Wang, Wentao Chang, Songqing Chen, Aziz Mohaisen:
A Data-Driven Study of DDoS Attacks and Their Dynamics. 648-661 - Antonio Montieri, Domenico Ciuonzo, Giuseppe Aceto, Antonio Pescapè:
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web). 662-675
Volume 17, Number 4, July - August 2020
- Xiaohui Liang, Ronald A. Peterson, David Kotz:
Securely Connecting Wearables to Ambient Displays with User Intent. 676-690 - Sai Mounika Errapotu, Hongning Li, Rong Yu, Shaolei Ren, Qingqi Pei, Miao Pan, Zhu Han:
Clock Auction Inspired Privacy Preserving Emergency Demand Response in Colocation Data Centers. 691-702 - Liehuang Zhu, Meng Li, Zijian Zhang, Zhan Qin:
ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks. 703-715 - Hong Zhao, Luke Kwiat, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection. 716-729 - Muhammad Shahzad, M. Zubair Shafiq, Alex X. Liu:
Large Scale Characterization of Software Vulnerability Life Cycles. 730-744 - Aziz Mohaisen, Zhongshu Gu, Kui Ren, Zhenhua Li, Charles A. Kamhoua, Laurent L. Njilla, DaeHun Nyang:
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation. 745-759 - Yan Zhang, Loukas Lazos:
Misbehavior in Multi-Channel MAC Protocols. 760-774 - Andrea Visconti, Federico Gorla:
Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2. 775-781 - Jing Li, Peng Li, Rebecca J. Stones, Gang Wang, Zhongwei Li, Xiaoguang Liu:
Reliability Equations for Cloud Storage Systems with Proactive Fault Tolerance. 782-794 - Xiaobo Ma, Bo An, Mengchen Zhao, Xiapu Luo, Lei Xue, Zhenhua Li, Tony T. N. Miu, Xiaohong Guan:
Randomized Security Patrolling for Link Flooding Attack Detection. 795-812 - Arslan Munir, Farinaz Koushanfar:
Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study. 813-827 - Sheng Li, Xinpeng Zhang, Zhenxing Qian, Guorui Feng, Yanli Ren:
Key Based Artificial Fingerprint Generation for Privacy Protection. 828-840 - Bert Abrath, Bart Coppens, Mohit Mishra, Jens Van den Broeck, Bjorn De Sutter:
$\Delta$ΔBreakpad: Diversified Binary Crash Reporting. 841-856 - Jun Feng, Laurence T. Yang, Qing Zhu, Kim-Kwang Raymond Choo:
Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment. 857-868 - Zishan Liu, Zhenyu Liu, Lin Zhang, Xiaodong Lin:
MARP: A Distributed MAC Layer Attack Resistant Pseudonym Scheme for VANET. 869-882 - Sungjin Park, Chung Hwan Kim, Junghwan Rhee, Jong-Jin Won, Taisook Han, Dongyan Xu:
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality. 883-897
Volume 17, Number 5, September - October 2020
- Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Yang Yang, HweeHwa Pang:
Privacy-Preserving Outsourced Calculation Toolkit in the Cloud. 898-911 - Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao:
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. 912-927 - Javier Álvarez Cid-Fuentes, Claudia Szabo, Katrina Falkner:
Adaptive Performance Anomaly Detection in Distributed Systems Using Online SVMs. 928-941 - Jangirala Srinivas, Ashok Kumar Das, Neeraj Kumar, Joel J. P. C. Rodrigues:
Cloud Centric Authentication for Wearable Healthcare Monitoring System. 942-956 - Dina Kamel, François-Xavier Standaert, Alexandre Duc, Denis Flandre, Francesco Berti:
Learning with Physical Noise or Errors. 957-971 - Ziyuan Hu, Shengli Liu, Kefei Chen:
Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks. 972-983 - Shujie Cui, Muhammad Rizwan Asghar, Giovanni Russello:
Multi-CDN: Towards Privacy in Content Delivery Networks. 984-999 - Jinsoo Jang, Brent ByungHoon Kang:
Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection. 1000-1014 - Mikhail Dorojevets:
Energy-Efficient Superconductor Bloom Filters for Streaming Data Inspection. 1015-1025 - Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Kai He, Yuting Xiao:
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices. 1026-1038 - Rachid Guerraoui, Alexandre Maurer:
The Cost of Scaling a Reliable Interconnection Topology. 1039-1050 - Jianan Hong, Kaiping Xue, Na Gai, David S. L. Wei, Peilin Hong:
Service Outsourcing in F2C Architecture with Attribute-based Anonymous Access Control and Bounded Service Number. 1051-1062 - Wei Song, Qingqing Huang, Jeff Huang:
Understanding JavaScript Vulnerabilities in Large Real-World Android Applications. 1063-1078 - Dajiang Chen, Ning Zhang, Nan Cheng, Kuan Zhang, Zhiguang Qin, Xuemin Shen:
Physical Layer based Message Authentication with Secure Channel Codes. 1079-1093 - Zeyu Mi, Haibo Chen, Yinqian Zhang, ShuangHe Peng, Xiaofeng Wang, Michael K. Reiter:
CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. 1094-1108 - Lu Ou, Zheng Qin, Shaolin Liao, Yuan Hong, Xiaohua Jia:
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy. 1109-1123 - Debiao He, Yudi Zhang, Ding Wang, Kim-Kwang Raymond Choo:
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. 1124-1132
Volume 17, Number 6, November - December 2020
- Jangirala Srinivas, Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar:
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things. 1133-1146 - Jose Ignacio Aizpurua, Yiannis Papadopoulos, Guillaume Merle:
Explicit Modelling and Treatment of Repair in Prediction of Dependability. 1147-1162 - Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Yuan Yan Tang:
A Risk Management Approach to Defending Against the Advanced Persistent Threat. 1163-1172 - Jiayi Chen, Jianping He, Lin Cai, Jianping Pan:
Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing. 1173-1187 - Liang Zhao, Liqun Chen:
Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited. 1188-1206 - Kai He, Jun Guo, Jian Weng, Jiasi Weng, Joseph K. Liu, Xun Yi:
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data. 1207-1217 - Leo Yu Zhang, Yifeng Zheng, Jian Weng, Cong Wang, Zihao Shan, Kui Ren:
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center. 1218-1231 - Rekha Govindaraj, Swaroop Ghosh, Srinivas Katkoori:
Design, Analysis and Application of Embedded Resistive RAM Based Strong Arbiter PUF. 1232-1242 - Hui Xu, Zirui Zhao, Yangfan Zhou, Michael R. Lyu:
Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs. 1243-1256 - Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising. 1257-1268 - Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila Altay Yavuz:
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives. 1269-1282 - Yulai Xie, Dan Feng, Yuchong Hu, Yan Li, Staunton Sample, Darrell D. E. Long:
Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments. 1283-1296 - Mihai Maruseac, Gabriel Ghinita:
Precision-Enhanced Differentially-Private Mining of High-Confidence Association Rules. 1297-1309 - Lin Yao, Zhenzhen Fan, Jing Deng, Xin Fan, Guowei Wu:
Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks. 1310-1321 - Xueqiao Liu, Guomin Yang, Yi Mu, Robert H. Deng:
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage. 1322-1332 - Pierre Bergé, Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
The Authorization Policy Existence Problem. 1333-1344
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.