Search dblp for Publications

export results for "toc:db/journals/tdsc/tdsc4.bht:"

 download as .bib file

@article{DBLP:journals/tdsc/AhmedT07,
  author       = {Ahmed Awad E. Ahmed and
                  Issa Traor{\'{e}}},
  title        = {A New Biometric Technology Based on Mouse Dynamics},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {3},
  pages        = {165--179},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.70207},
  doi          = {10.1109/TDSC.2007.70207},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AhmedT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AwerbuchKMPV07,
  author       = {Baruch Awerbuch and
                  Shay Kutten and
                  Yishay Mansour and
                  Boaz Patt{-}Shamir and
                  George Varghese},
  title        = {A Time-Optimal Self-Stabilizing Synchronizer Using {A} Phase Clock},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {3},
  pages        = {180--190},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.1007},
  doi          = {10.1109/TDSC.2007.1007},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AwerbuchKMPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BadishiHK07,
  author       = {Gal Badishi and
                  Amir Herzberg and
                  Idit Keidar},
  title        = {Keeping Denial-of-Service Attackers in the Dark},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {3},
  pages        = {191--204},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.70209},
  doi          = {10.1109/TDSC.2007.70209},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BadishiHK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BouabdallahS07,
  author       = {Nizar Bouabdallah and
                  Bruno Sericola},
  title        = {Introducing a Relative Priority for the Shared-Protection Schemes},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {3},
  pages        = {205--215},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.1008},
  doi          = {10.1109/TDSC.2007.1008},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BouabdallahS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BucciGLT07,
  author       = {Marco Bucci and
                  Luca Giancane and
                  Raimondo Luzzi and
                  Alessandro Trifiletti},
  title        = {A Dynamic and Differential {CMOS} Lookup Table with Data-Independent
                  Power Consumption for Cryptographic Applications on Chip Cards},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {4},
  pages        = {245--251},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.70212},
  doi          = {10.1109/TDSC.2007.70212},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BucciGLT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaiHPP07,
  author       = {Min Cai and
                  Kai Hwang and
                  Jianping Pan and
                  Christos Papadopoulos},
  title        = {WormShield: Fast Worm Signature Generation with Distributed Fingerprint
                  Aggregation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {2},
  pages        = {88--104},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.1000},
  doi          = {10.1109/TDSC.2007.1000},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CaiHPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CervesatoM07,
  author       = {Iliano Cervesato and
                  Catherine Meadows},
  title        = {One Picture Is Worth a Dozen Connectives: {A} Fault-Tree Representation
                  of {NPATRL} Security Requirements},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {3},
  pages        = {216--227},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.70206},
  doi          = {10.1109/TDSC.2007.70206},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CervesatoM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Chien07,
  author       = {Hung{-}Yu Chien},
  title        = {{SASI:} {A} New Ultralightweight {RFID} Authentication Protocol Providing
                  Strong Authentication and Strong Integrity},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {4},
  pages        = {337--340},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.70226},
  doi          = {10.1109/TDSC.2007.70226},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Chien07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DantuCP07,
  author       = {Ram Dantu and
                  Jo{\~{a}}o W. Cangussu and
                  Sudeep Patwardhan},
  title        = {Fast Worm Containment Using Feedback Control},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {2},
  pages        = {119--136},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.1002},
  doi          = {10.1109/TDSC.2007.1002},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DantuCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GashiPS07,
  author       = {Ilir Gashi and
                  Peter T. Popov and
                  Lorenzo Strigini},
  title        = {Fault Tolerance via Diversity for Off-the-Shelf Products: {A} Study
                  with {SQL} Database Servers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {4},
  pages        = {280--294},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.70208},
  doi          = {10.1109/TDSC.2007.70208},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GashiPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Gokhale07,
  author       = {Swapna S. Gokhale},
  title        = {Architecture-Based Software Reliability Analysis: Overview and Limitations},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {32--40},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.4},
  doi          = {10.1109/TDSC.2007.4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Gokhale07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GorenderMR07,
  author       = {S{\'{e}}rgio Gorender and
                  Raimundo Jos{\'{e}} de Ara{\'{u}}jo Mac{\^{e}}do and
                  Michel Raynal},
  title        = {An Adaptive Programming Model for Fault-Tolerant Distributed Computing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {18--31},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.3},
  doi          = {10.1109/TDSC.2007.3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GorenderMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HaleemMCS07,
  author       = {Mohamed A. Haleem and
                  Chetan Nanjunda Mathur and
                  Rajarathnam Chandramouli and
                  K. P. Subbalakshmi},
  title        = {Opportunistic Encryption: {A} Trade-Off between Security and Throughput
                  in Wireless Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {4},
  pages        = {313--324},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.70214},
  doi          = {10.1109/TDSC.2007.70214},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HaleemMCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HwangCCQ07,
  author       = {Kai Hwang and
                  Min Cai and
                  Ying Chen and
                  Min Qin},
  title        = {Hybrid Intrusion Detection with Weighted Signature Generation over
                  Anomalous Internet Episodes},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {41--55},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.9},
  doi          = {10.1109/TDSC.2007.9},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HwangCCQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HwangLL07,
  author       = {Tzonelih Hwang and
                  Kuo{-}Chang Lee and
                  Chuan{-}Ming Li},
  title        = {Provably Secure Three-Party Authenticated Quantum Key Distribution
                  Protocols},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {71--80},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.13},
  doi          = {10.1109/TDSC.2007.13},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HwangLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Iyer07,
  author       = {Ravishankar K. Iyer},
  title        = {Editorial: Dependability and Security},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {2},
  pages        = {85--87},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.070201},
  doi          = {10.1109/TDSC.2007.070201},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Iyer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KhannaCVBCV07,
  author       = {Gunjan Khanna and
                  Mike Yu Cheng and
                  Padma Varadharajan and
                  Saurabh Bagchi and
                  Miguel P. Correia and
                  Paulo Ver{\'{\i}}ssimo},
  title        = {Automated Rule-Based Diagnosis through a Distributed Monitor System},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {4},
  pages        = {266--279},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.70211},
  doi          = {10.1109/TDSC.2007.70211},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KhannaCVBCV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeeTPP07,
  author       = {Jeremy Lee and
                  Mohammad Tehranipoor and
                  Chintan Patel and
                  Jim Plusquellic},
  title        = {Securing Designs against Scan-Based Side-Channel Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {4},
  pages        = {325--336},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.70215},
  doi          = {10.1109/TDSC.2007.70215},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LeeTPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PeisertBKM07,
  author       = {Sean Peisert and
                  Matt Bishop and
                  Sidney Karin and
                  Keith Marzullo},
  title        = {Analysis of Computer Intrusions Using Sequences of Function Calls},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {2},
  pages        = {137--150},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.1003},
  doi          = {10.1109/TDSC.2007.1003},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PeisertBKM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RamasamyAS07,
  author       = {HariGovind V. Ramasamy and
                  Adnan Agbaria and
                  William H. Sanders},
  title        = {A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy
                  Execution},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {1--17},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.2},
  doi          = {10.1109/TDSC.2007.2},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RamasamyAS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ReayBDM07,
  author       = {Ian Reay and
                  Patricia Beatty and
                  Scott Dick and
                  James Miller},
  title        = {A Survey and Analysis of the {P3P} Protocol's Agents, Adoption, Maintenance,
                  and Future},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {2},
  pages        = {151--164},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.1004},
  doi          = {10.1109/TDSC.2007.1004},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ReayBDM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ScherrerLOBA07,
  author       = {Antoine Scherrer and
                  Nicolas Larrieu and
                  Philippe Owezarski and
                  Pierre Borgnat and
                  Patrice Abry},
  title        = {Non-Gaussian and Long Memory Statistical Characterizations for Internet
                  Traffic with Anomalies},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {56--70},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.12},
  doi          = {10.1109/TDSC.2007.12},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ScherrerLOBA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SerafiniBS07,
  author       = {Marco Serafini and
                  Andrea Bondavalli and
                  Neeraj Suri},
  title        = {Online Diagnosis and Recovery: On the Choice and Impact of Tuning
                  Parameters},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {4},
  pages        = {295--312},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.70210},
  doi          = {10.1109/TDSC.2007.70210},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/SerafiniBS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuB07,
  author       = {Xiaoxin Wu and
                  Elisa Bertino},
  title        = {An Analysis Study on Zone-Based Anonymous Communication in Mobile
                  Ad Hoc Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {4},
  pages        = {252--265},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.70213},
  doi          = {10.1109/TDSC.2007.70213},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YuSL07,
  author       = {Wei Yu and
                  Yan Sun and
                  K. J. Ray Liu},
  title        = {Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {3},
  pages        = {228--242},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.1006},
  doi          = {10.1109/TDSC.2007.1006},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YuSL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZouTG07,
  author       = {Cliff Changchun Zou and
                  Donald F. Towsley and
                  Weibo Gong},
  title        = {Modeling and Simulation Study of the Propagation and Defense of Internet
                  E-mail Worms},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {2},
  pages        = {105--118},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.1001},
  doi          = {10.1109/TDSC.2007.1001},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZouTG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics