![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
IEEE Transactions on Dependable and Secure Computing, Volume 3
Volume 3, Number 1, January-March 2006
- Ravishankar K. Iyer:
Editorial: Dependability and Security--Looking Foward to 2006. 1
- André Schiper, Sam Toueg:
From Set Membership to Group Membership: A Separation of Concerns. 2-12 - Anna Cinzia Squicciarini
, Elisa Bertino, Elena Ferrari
, Indrakshi Ray:
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. 13-30 - Konstantinos Xinidis, Ioannis Charitakis, Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos:
An Active Splitter Architecture for Intrusion Detection and Prevention. 31-44 - Gal Badishi, Idit Keidar, Amir Sasson:
Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast. 45-61 - Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney:
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. 62-77 - Danny Nebenzahl, Shmuel Sagiv, Avishai Wool
:
Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. 78-90 - Shyh-Yih Wang, Chi-Sung Laih:
Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme. 91-100
Volume 3, Number 2, April-June 2006
- Yanjiang Yang, Robert H. Deng
, Feng Bao:
A Practical Password-Based Two-Server Authentication and Key Exchange System. 105-114 - Gunjan Khanna, Padma Varadharajan, Saurabh Bagchi:
Automated Online Monitoring of Distributed Applications through External Monitors. 115-129 - Tatsuya Ozaki, Tadashi Dohi
, Hiroyuki Okamura
, Naoto Kaio
:
Distribution-Free Checkpoint Placement Algorithms Based on Min-Max Principle. 130-140 - Yoohwan Kim, Wing Cheong Lau, Mooi Choo Chuah, H. Jonathan Chao:
PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks. 141-155 - Anil L. Pereira, Vineela Muppavarapu, Soon Myoung Chung:
Role-Based Access Control for Grid Database Services Using the Community Authorization Service. 156-166
Volume 3, Number 3, July-September 2006
- Jean Arlat, Andrea Bondavalli
, Boudewijn R. Haverkort
, Paulo Veríssimo
:
Guest Editorial for the Special Issue on the 2005 IEEE/IFIP Conference on Dependable Systems and Networks, including the Dependable Computing and Communications and Performance and Dependability Symposia. 169-171 - Elisabeth A. Strunk, John C. Knight:
Dependability through Assured Reconfiguration in Embedded System Software. 172-187 - Nicholas J. Wang, Sanjay J. Patel:
ReStore: Symptom-Based Soft Error Detection in Microprocessors. 188-201 - Jean-Philippe Martin, Lorenzo Alvisi:
Fast Byzantine Consensus. 202-215 - Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting:
System Call Monitoring Using Authenticated System Calls. 216-229 - Alper Tugay Mizrak, Yuchung Cheng, Keith Marzullo, Stefan Savage:
Detecting and Isolating Malicious Routers. 230-244 - Axel Thümmler, Peter Buchholz
, Miklós Telek:
A Novel Approach for Phase-Type Fitting with the EM Algorithm. 245-258 - Peter Kemper, Dennis Müller, Axel Thümmler:
Combining Response Surface Methodology with Numerical Methods for Optimization of Markovian Models. 259-269
Volume 3, Number 4, October-December 2006
- Junghee Han, David Watson, Farnam Jahanian:
An Experimental Study of Internet Path Diversity. 273-288 - Zachary K. Baker, Viktor K. Prasanna:
Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs. 289-300 - Anthony Y. Fu, Liu Wenyin, Xiaotie Deng
:
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD). 301-311 - Guofei Jiang, Haifeng Chen, Kenji Yoshihira:
Modeling and Tracking of Transaction Flow Dynamics for Fault Detection in Complex Systems. 312-326 - Angelo Ciaramella
, Paolo D'Arco, Alfredo De Santis
, Clemente Galdi
, Roberto Tagliaferri
:
Neural Network Techniques for Proactive Password Checking. 327-339 - Jiangtao Li, Ninghui Li:
OACerts: Oblivious Attribute Certificates. 340-352 - Vilas Sridharan, Hossein Asadi
, Mehdi Baradaran Tahoori, David R. Kaeli:
Reducing Data Cache Susceptibility to Soft Errors. 353-364 - Krerk Piromsopa
, Richard J. Enbody:
Secure Bit: Transparent, Hardware Buffer-Overflow Protection. 365-376 - Adnan Vora, Mikhail Nesterenko:
Secure Location Verification Using Radio Broadcast. 377-385 - Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
:
Securing Mobile Ad Hoc Networks with Certificateless Public Keys. 386-399
- Jean-Philippe Martin, Lorenzo Alvisi:
Correction to "Fast Byzantine Consensus". 400
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.