default search action
IEEE Transactions on Dependable and Secure Computing, Volume 4
Volume 4, Number 1, January-March 2007
- HariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders:
A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution. 1-17 - Sérgio Gorender, Raimundo José de Araújo Macêdo, Michel Raynal:
An Adaptive Programming Model for Fault-Tolerant Distributed Computing. 18-31 - Swapna S. Gokhale:
Architecture-Based Software Reliability Analysis: Overview and Limitations. 32-40 - Kai Hwang, Min Cai, Ying Chen, Min Qin:
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. 41-55 - Antoine Scherrer, Nicolas Larrieu, Philippe Owezarski, Pierre Borgnat, Patrice Abry:
Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies. 56-70 - Tzonelih Hwang, Kuo-Chang Lee, Chuan-Ming Li:
Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols. 71-80
Volume 4, Number 2, April-June 2007
- Ravishankar K. Iyer:
Editorial: Dependability and Security. 85-87 - Min Cai, Kai Hwang, Jianping Pan, Christos Papadopoulos:
WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation. 88-104 - Cliff Changchun Zou, Donald F. Towsley, Weibo Gong:
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms. 105-118 - Ram Dantu, João W. Cangussu, Sudeep Patwardhan:
Fast Worm Containment Using Feedback Control. 119-136 - Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo:
Analysis of Computer Intrusions Using Sequences of Function Calls. 137-150 - Ian Reay, Patricia Beatty, Scott Dick, James Miller:
A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future. 151-164
Volume 4, Number 3, July-September 2007
- Ahmed Awad E. Ahmed, Issa Traoré:
A New Biometric Technology Based on Mouse Dynamics. 165-179 - Baruch Awerbuch, Shay Kutten, Yishay Mansour, Boaz Patt-Shamir, George Varghese:
A Time-Optimal Self-Stabilizing Synchronizer Using A Phase Clock. 180-190 - Gal Badishi, Amir Herzberg, Idit Keidar:
Keeping Denial-of-Service Attackers in the Dark. 191-204 - Nizar Bouabdallah, Bruno Sericola:
Introducing a Relative Priority for the Shared-Protection Schemes. 205-215 - Iliano Cervesato, Catherine Meadows:
One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. 216-227 - Wei Yu, Yan Sun, K. J. Ray Liu:
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes. 228-242
Volume 4, Number 4, October-December 2007
- Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti:
A Dynamic and Differential CMOS Lookup Table with Data-Independent Power Consumption for Cryptographic Applications on Chip Cards. 245-251 - Xiaoxin Wu, Elisa Bertino:
An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks. 252-265 - Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel P. Correia, Paulo Veríssimo:
Automated Rule-Based Diagnosis through a Distributed Monitor System. 266-279 - Ilir Gashi, Peter T. Popov, Lorenzo Strigini:
Fault Tolerance via Diversity for Off-the-Shelf Products: A Study with SQL Database Servers. 280-294 - Marco Serafini, Andrea Bondavalli, Neeraj Suri:
Online Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters. 295-312 - Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks. 313-324 - Jeremy Lee, Mohammad Tehranipoor, Chintan Patel, Jim Plusquellic:
Securing Designs against Scan-Based Side-Channel Attacks. 325-336 - Hung-Yu Chien:
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. 337-340
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.