


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 13
Volume 13, Number 1, January - February 2016
- Elisa Bertino:

The State of the Journal Editorial. 1 - Alexey V. Vinel, Xiaomin Ma, Dijiang Huang

:
Guest Editors' Introduction: Special Issue on Reliable and Secure VANETs. 2-4 - Che-Yu Chang, Hsu-Chun Yen, Der-Jiunn Deng:

V2V QoS Guaranteed Channel Access in IEEE 802.11p VANETs. 5-17 - Bernhard Kloiber, Jérôme Härri

, Thomas Strang, Stephan Sand, Cristina Rico Garcia:
Random Transmit Power Control for DSRC and its Application to Cooperative Safety. 18-31 - Mahmoud Hashem Eiza

, Thomas J. Owens
, Qiang Ni
:
Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs. 32-45 - Pedro J. Fernández, José Santa

, Fernando Bernal-Hidalgo, Antonio F. Skarmeta
:
Securing Vehicular IPv6 Communications. 46-58 - Xin-Lin Huang, Jun Wu, Wenfeng Li, Zhifeng Zhang, Fusheng Zhu, Minghao Wu:

Historical Spectrum Sensing Data Mining for Cognitive Radio Enabled Vehicular Ad-Hoc Networks. 59-70 - Chen Lyu, Dawu Gu, Yunze Zeng, Prasant Mohapatra:

PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications. 71-83 - Wei Li, Wenwen Zhang, Dawu Gu, Yanqin Cao, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:

Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks. 84-92 - Rong Yu, Jiawen Kang

, Xumin Huang, Shengli Xie, Yan Zhang, Stein Gjessing:
MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks. 93-105 - Hassan Artail, Noor Abbani:

A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks. 106-119 - Julian Timpner, Dominik Schürmann

, Lars C. Wolf:
Trustworthy Parking Communities: Helping Your Neighbor to Find a Space. 120-132 - Neeraj Kumar

, Sudip Misra
, Naveen K. Chilamkurti, Jong-Hyouk Lee, Joel J. P. C. Rodrigues:
Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment. 133-145
Volume 13, Number 2, March - April 2016
- Wojciech Mazurczyk

, Thomas Holt, Krzysztof Szczypiorski
:
Guest Editors' Introduction: Special Issue on Cyber Crime. 146-147 - Shams Zawoad, Amit Kumar Dutta, Ragib Hasan

:
Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service. 148-162 - Jin B. Hong

, Dong Seong Kim
:
Assessing the Effectiveness of Moving Target Defenses Using Security Models. 163-177 - Michael Backes, Niklas Grimm, Aniket Kate:

Data Lineage in Malicious Environments. 178-191 - Michael R. Watson, Noor-ul-Hassan Shirazi

, Angelos K. Marnerides
, Andreas Mauthe
, David Hutchison
:
Malware Detection in Cloud Computing Infrastructures. 192-205 - Marie Vasek

, John Wadleigh, Tyler Moore
:
Hacking Is Not Random: A Case-Control Study of Webserver-Compromise Risk. 206-219 - Yang Liu, Shiyan Hu

, Tsung-Yi Ho
:
Leveraging Strategic Detection Techniques for Smart Home Pricing Cyberattacks. 220-235 - Aditya K. Sood, Sherali Zeadally, Richard J. Enbody:

An Empirical Study of HTTP-based Financial Botnets. 236-251 - Stanislav Ponomarev, Travis Atkison:

Industrial Control System Network Intrusion Detection by Telemetry Analysis. 252-260 - Markus Riek, Rainer Böhme

, Tyler Moore
:
Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance. 261-273 - Pradhumna Lal Shrestha, Michael Hempel

, Fahimeh Rezaei, Hamid Sharif:
A Support Vector Machine-Based Framework for Detection of Covert Timing Channels. 274-283 - Imran Erguler:

Achieving Flatness: Selecting the Honeywords from Existing User Passwords. 284-295 - Vanesa Daza

, Roberto Di Pietro
, Flavio Lombardi
, Matteo Signorini:
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments. 296-311
Volume 13, Number 3, May - June 2016
- Hongwei Li, Yi Yang, Tom H. Luan

, Xiaohui Liang
, Liang Zhou, Xuemin Sherman Shen
:
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data. 312-325 - Shaoquan Jiang:

Group Key Agreement with Local Connectivity. 326-339 - Jonghyuk Song, Sangho Lee, Jong Kim:

Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata. 340-354 - Srikar Tati, Scott Rager, Bong Jun Ko, Guohong Cao, Ananthram Swami, Thomas La Porta:

netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks. 355-368 - Xun Yi, Athman Bouguettaya

, Dimitrios Georgakopoulos
, Andy Song
, Jan Willemson
:
Privacy Protection for Wireless Medical Sensor Data. 369-380 - Hui Shen, Ram Krishnan

, Rocky Slavin
, Jianwei Niu:
Sequence Diagram Aided Privacy Policy Specification. 381-393 - Song Fang, Yao Liu, Peng Ning:

Wireless Communications under Broadband Reactive Jamming Attacks. 394-408
Volume 13, Number 4, July - August 2016
- Elisa Bertino, Dario Catalano, Qi Li, Alex X. Liu, Anna Cinzia Squicciarini

, Alexey V. Vinel:
Editor's Note. 409-410 - Lianshan Sun, Jaehong Park, Dang Nguyen, Ravi S. Sandhu:

A Provenance-Aware Access Control Framework with Typed Provenance. 411-423 - Yuan Cheng

, Jaehong Park, Ravi S. Sandhu:
An Access Control Model for Online Social Networks Using User-to-User Relationships. 424-436 - Stijn Volckaert, Bart Coppens, Bjorn De Sutter:

Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution. 437-450 - Arcangelo Castiglione

, Alfredo De Santis
, Barbara Masucci:
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes. 451-460 - Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu

, Nan Zhang, Kui Ren
, Xinwen Fu
:
Password Extraction via Reconstructed Wireless Mouse Trajectory. 461-473 - Hussain M. J. Almohri

, Layne T. Watson, Danfeng Yao
, Xinming Ou:
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming. 474-487 - Zhi Yang, Jilong Xue, Xiaoyong Yang, Xiao Wang, Yafei Dai:

VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils. 488-501 - Antonio Martínez-Álvarez

, Felipe Restrepo-Calle
, Sergio Cuenca-Asensi
, Leonardo M. Reyneri, Almudena Lindoso
, Luis Entrena
:
A Hardware-Software Approach for On-Line Soft Error Mitigation in Interrupt-Driven Applications. 502-508
Volume 13, Number 5, September - October 2016
- Ali Fattaholmanan, Hamid R. Rabiee

:
A Large-Scale Active Measurement Study on the Effectiveness of Piece-Attack on BitTorrent Networks. 509-518 - Kerem Kaynar

, Fikret Sivrikaya
:
Distributed Attack Graph Generation. 519-532 - Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, Jian Weng

:
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption. 533-546 - Yang Liu, Wenji Chen, Yong Guan:

Identifying High-Cardinality Hosts from Network-Wide Traffic Measurements. 547-558 - Zhijun Wu, Liyuan Zhang, Meng Yue:

Low-Rate DoS Attacks Detection Based on Network Multifractal. 559-567 - Chi-Wei Wang, Chia-Wei Wang, Shiuhpyng Shieh:

ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction. 568-581 - P. V. Rajkumar, Ravi S. Sandhu:

Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains. 582-590 - Bharath K. Samanthula, Wei Jiang:

Secure Multiset Intersection Cardinality and its Application to Jaccard Coefficient. 591-604
Volume 13, Number 6, November - December 2016
- Lingjun Li, Xinxin Zhao, Guoliang Xue:

A Proximity Authentication System for Smartphones. 605-616 - Feng Hao

, Dylan Clarke, Avelino Francisco Zorzo
:
Deleting Secret Data with Public Verifiability. 617-629 - Barbara Carminati

, Elena Ferrari
, Michele Guglielmi:
Detection of Unspecified Emergencies for Controlled Information Sharing. 630-643 - Gregory Levitin, Liudong Xing, Qingqing Zhai

, Yuanshun Dai:
Optimization of Full versus Incremental Periodic Backup Policy. 644-656 - Min-Te Sun, Kazuya Sakai, Wei-Shinn Ku

, Ten-Hwang Lai, Athanasios V. Vasilakos
:
Private and Secure Tag Access for Large-Scale RFID Systems. 657-671 - Yuchang Mo, Liudong Xing, Farong Zhong, Zhao Zhang:

Reliability Evaluation of Network Systems with Dependent Propagated Failures Using Decision Diagrams. 672-683 - Ing-Ray Chen, Fenye Bao, Jia Guo:

Trust-Based Service Management for Social Internet of Things Systems. 684-696

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














