default search action
IEEE Transactions on Dependable and Secure Computing, Volume 13
Volume 13, Number 1, January - February 2016
- Elisa Bertino:
The State of the Journal Editorial. 1 - Alexey V. Vinel, Xiaomin Ma, Dijiang Huang:
Guest Editors' Introduction: Special Issue on Reliable and Secure VANETs. 2-4 - Che-Yu Chang, Hsu-Chun Yen, Der-Jiunn Deng:
V2V QoS Guaranteed Channel Access in IEEE 802.11p VANETs. 5-17 - Bernhard Kloiber, Jérôme Härri, Thomas Strang, Stephan Sand, Cristina Rico Garcia:
Random Transmit Power Control for DSRC and its Application to Cooperative Safety. 18-31 - Mahmoud Hashem Eiza, Thomas J. Owens, Qiang Ni:
Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs. 32-45 - Pedro J. Fernández, José Santa, Fernando Bernal-Hidalgo, Antonio F. Skarmeta:
Securing Vehicular IPv6 Communications. 46-58 - Xin-Lin Huang, Jun Wu, Wenfeng Li, Zhifeng Zhang, Fusheng Zhu, Minghao Wu:
Historical Spectrum Sensing Data Mining for Cognitive Radio Enabled Vehicular Ad-Hoc Networks. 59-70 - Chen Lyu, Dawu Gu, Yunze Zeng, Prasant Mohapatra:
PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications. 71-83 - Wei Li, Wenwen Zhang, Dawu Gu, Yanqin Cao, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks. 84-92 - Rong Yu, Jiawen Kang, Xumin Huang, Shengli Xie, Yan Zhang, Stein Gjessing:
MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks. 93-105 - Hassan Artail, Noor Abbani:
A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks. 106-119 - Julian Timpner, Dominik Schürmann, Lars C. Wolf:
Trustworthy Parking Communities: Helping Your Neighbor to Find a Space. 120-132 - Neeraj Kumar, Sudip Misra, Naveen K. Chilamkurti, Jong-Hyouk Lee, Joel J. P. C. Rodrigues:
Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment. 133-145
Volume 13, Number 2, March - April 2016
- Wojciech Mazurczyk, Thomas Holt, Krzysztof Szczypiorski:
Guest Editors' Introduction: Special Issue on Cyber Crime. 146-147 - Shams Zawoad, Amit Kumar Dutta, Ragib Hasan:
Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service. 148-162 - Jin B. Hong, Dong Seong Kim:
Assessing the Effectiveness of Moving Target Defenses Using Security Models. 163-177 - Michael Backes, Niklas Grimm, Aniket Kate:
Data Lineage in Malicious Environments. 178-191 - Michael R. Watson, Noor-ul-Hassan Shirazi, Angelos K. Marnerides, Andreas Mauthe, David Hutchison:
Malware Detection in Cloud Computing Infrastructures. 192-205 - Marie Vasek, John Wadleigh, Tyler Moore:
Hacking Is Not Random: A Case-Control Study of Webserver-Compromise Risk. 206-219 - Yang Liu, Shiyan Hu, Tsung-Yi Ho:
Leveraging Strategic Detection Techniques for Smart Home Pricing Cyberattacks. 220-235 - Aditya K. Sood, Sherali Zeadally, Richard J. Enbody:
An Empirical Study of HTTP-based Financial Botnets. 236-251 - Stanislav Ponomarev, Travis Atkison:
Industrial Control System Network Intrusion Detection by Telemetry Analysis. 252-260 - Markus Riek, Rainer Böhme, Tyler Moore:
Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance. 261-273 - Pradhumna Lal Shrestha, Michael Hempel, Fahimeh Rezaei, Hamid Sharif:
A Support Vector Machine-Based Framework for Detection of Covert Timing Channels. 274-283 - Imran Erguler:
Achieving Flatness: Selecting the Honeywords from Existing User Passwords. 284-295 - Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments. 296-311
Volume 13, Number 3, May - June 2016
- Hongwei Li, Yi Yang, Tom H. Luan, Xiaohui Liang, Liang Zhou, Xuemin Sherman Shen:
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data. 312-325 - Shaoquan Jiang:
Group Key Agreement with Local Connectivity. 326-339 - Jonghyuk Song, Sangho Lee, Jong Kim:
Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata. 340-354 - Srikar Tati, Scott Rager, Bong Jun Ko, Guohong Cao, Ananthram Swami, Thomas La Porta:
netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks. 355-368 - Xun Yi, Athman Bouguettaya, Dimitrios Georgakopoulos, Andy Song, Jan Willemson:
Privacy Protection for Wireless Medical Sensor Data. 369-380 - Hui Shen, Ram Krishnan, Rocky Slavin, Jianwei Niu:
Sequence Diagram Aided Privacy Policy Specification. 381-393 - Song Fang, Yao Liu, Peng Ning:
Wireless Communications under Broadband Reactive Jamming Attacks. 394-408
Volume 13, Number 4, July - August 2016
- Elisa Bertino, Dario Catalano, Qi Li, Alex X. Liu, Anna Cinzia Squicciarini, Alexey V. Vinel:
Editor's Note. 409-410 - Lianshan Sun, Jaehong Park, Dang Nguyen, Ravi S. Sandhu:
A Provenance-Aware Access Control Framework with Typed Provenance. 411-423 - Yuan Cheng, Jaehong Park, Ravi S. Sandhu:
An Access Control Model for Online Social Networks Using User-to-User Relationships. 424-436 - Stijn Volckaert, Bart Coppens, Bjorn De Sutter:
Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution. 437-450 - Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci:
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes. 451-460 - Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang, Kui Ren, Xinwen Fu:
Password Extraction via Reconstructed Wireless Mouse Trajectory. 461-473 - Hussain M. J. Almohri, Layne T. Watson, Danfeng Yao, Xinming Ou:
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming. 474-487 - Zhi Yang, Jilong Xue, Xiaoyong Yang, Xiao Wang, Yafei Dai:
VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils. 488-501 - Antonio Martínez-Álvarez, Felipe Restrepo-Calle, Sergio Cuenca-Asensi, Leonardo M. Reyneri, Almudena Lindoso, Luis Entrena:
A Hardware-Software Approach for On-Line Soft Error Mitigation in Interrupt-Driven Applications. 502-508
Volume 13, Number 5, September - October 2016
- Ali Fattaholmanan, Hamid R. Rabiee:
A Large-Scale Active Measurement Study on the Effectiveness of Piece-Attack on BitTorrent Networks. 509-518 - Kerem Kaynar, Fikret Sivrikaya:
Distributed Attack Graph Generation. 519-532 - Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, Jian Weng:
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption. 533-546 - Yang Liu, Wenji Chen, Yong Guan:
Identifying High-Cardinality Hosts from Network-Wide Traffic Measurements. 547-558 - Zhijun Wu, Liyuan Zhang, Meng Yue:
Low-Rate DoS Attacks Detection Based on Network Multifractal. 559-567 - Chi-Wei Wang, Chia-Wei Wang, Shiuhpyng Shieh:
ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction. 568-581 - P. V. Rajkumar, Ravi S. Sandhu:
Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains. 582-590 - Bharath K. Samanthula, Wei Jiang:
Secure Multiset Intersection Cardinality and its Application to Jaccard Coefficient. 591-604
Volume 13, Number 6, November - December 2016
- Lingjun Li, Xinxin Zhao, Guoliang Xue:
A Proximity Authentication System for Smartphones. 605-616 - Feng Hao, Dylan Clarke, Avelino Francisco Zorzo:
Deleting Secret Data with Public Verifiability. 617-629 - Barbara Carminati, Elena Ferrari, Michele Guglielmi:
Detection of Unspecified Emergencies for Controlled Information Sharing. 630-643 - Gregory Levitin, Liudong Xing, Qingqing Zhai, Yuanshun Dai:
Optimization of Full versus Incremental Periodic Backup Policy. 644-656 - Min-Te Sun, Kazuya Sakai, Wei-Shinn Ku, Ten-Hwang Lai, Athanasios V. Vasilakos:
Private and Secure Tag Access for Large-Scale RFID Systems. 657-671 - Yuchang Mo, Liudong Xing, Farong Zhong, Zhao Zhang:
Reliability Evaluation of Network Systems with Dependent Propagated Failures Using Decision Diagrams. 672-683 - Ing-Ray Chen, Fenye Bao, Jia Guo:
Trust-Based Service Management for Social Internet of Things Systems. 684-696
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.