Search dblp for Publications

export results for "toc:db/journals/tdsc/tdsc14.bht:"

 download as .bib file

@article{DBLP:journals/tdsc/0001HHKSZ17,
  author       = {Zhe Liu and
                  Xinyi Huang and
                  Zhi Hu and
                  Muhammad Khurram Khan and
                  Hwajeong Seo and
                  Lu Zhou},
  title        = {On Emerging Family of Elliptic Curves to Secure Internet of Things:
                  {ECC} Comes of Age},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {3},
  pages        = {237--248},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2016.2577022},
  doi          = {10.1109/TDSC.2016.2577022},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/0001HHKSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AbdouMO17,
  author       = {AbdelRahman Abdou and
                  Ashraf Matrawy and
                  Paul C. van Oorschot},
  title        = {{CPV:} Delay-Based Location Verification for the Internet},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {130--144},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2451614},
  doi          = {10.1109/TDSC.2015.2451614},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AbdouMO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AndersonMRVM17,
  author       = {James W. Anderson and
                  Hein Meling and
                  Alexander Rasmussen and
                  Amin Vahdat and
                  Keith Marzullo},
  title        = {Local Recovery for High Availability in Strongly Consistent Cloud
                  Services},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {172--184},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2443781},
  doi          = {10.1109/TDSC.2015.2443781},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AndersonMRVM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AzarderakhshFGH17,
  author       = {Reza Azarderakhsh and
                  Dieter Fishbein and
                  Gurleen Grewal and
                  Shi Hu and
                  David Jao and
                  Patrick Longa and
                  Rajeev Verma},
  title        = {Fast Software Implementations of Bilinear Pairings},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {6},
  pages        = {605--619},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2507120},
  doi          = {10.1109/TDSC.2015.2507120},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AzarderakhshFGH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BarazzuttiFMOR17,
  author       = {Rapha{\"{e}}l Barazzutti and
                  Pascal Felber and
                  Hugues Mercier and
                  Emanuel Onica and
                  Etienne Rivi{\`{e}}re},
  title        = {Efficient and Confidentiality-Preserving Content-Based Publish/Subscribe
                  with Prefiltering},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {3},
  pages        = {308--325},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2449831},
  doi          = {10.1109/TDSC.2015.2449831},
  timestamp    = {Wed, 15 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/BarazzuttiFMOR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Bertino17,
  author       = {Elisa Bertino},
  title        = {The State of the Journal Editorial},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {1},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2016.2634638},
  doi          = {10.1109/TDSC.2016.2634638},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Bertino17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Bertino17a,
  author       = {Elisa Bertino},
  title        = {Editor's Note},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {6},
  pages        = {577},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2017.2767518},
  doi          = {10.1109/TDSC.2017.2767518},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Bertino17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BhuiyanWWCLW17,
  author       = {Md. Zakirul Alam Bhuiyan and
                  Guojun Wang and
                  Jie Wu and
                  Jiannong Cao and
                  Xuefeng Liu and
                  Tian Wang},
  title        = {Dependable Structural Health Monitoring Using Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {363--376},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2469655},
  doi          = {10.1109/TDSC.2015.2469655},
  timestamp    = {Sat, 31 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BhuiyanWWCLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BissiasLLP17,
  author       = {George Bissias and
                  Brian Neil Levine and
                  Marc Liberatore and
                  Swagatika Prusty},
  title        = {Forensic Identification of Anonymous Sources in OneSwarm},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {6},
  pages        = {620--632},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2497706},
  doi          = {10.1109/TDSC.2015.2497706},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BissiasLLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BonolaBPPM17,
  author       = {Marco Bonola and
                  Giuseppe Bianchi and
                  Giulio Picierro and
                  Salvatore Pontarelli and
                  Marco Monaci},
  title        = {StreaMon: {A} Data-Plane Programming Abstraction for Software-Defined
                  Stream Monitoring},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {6},
  pages        = {664--678},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2499747},
  doi          = {10.1109/TDSC.2015.2499747},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BonolaBPPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BorchertSS17,
  author       = {Christoph Borchert and
                  Horst Schirmeier and
                  Olaf Spinczyk},
  title        = {Generic Soft-Error Detection and Correction for Concurrent Data Structures},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {22--36},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2427832},
  doi          = {10.1109/TDSC.2015.2427832},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BorchertSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CamaraLLVV17,
  author       = {Javier C{\'{a}}mara and
                  Rog{\'{e}}rio de Lemos and
                  Nuno Laranjeiro and
                  Rafael Ventura and
                  Marco Vieira},
  title        = {Robustness-Driven Resilience Evaluation of Self-Adaptive Software
                  Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {50--64},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2429128},
  doi          = {10.1109/TDSC.2015.2429128},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CamaraLLVV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChooKAG17,
  author       = {Kim{-}Kwang Raymond Choo and
                  Mehran Mozaffari Kermani and
                  Reza Azarderakhsh and
                  Manimaran Govindarasu},
  title        = {Emerging Embedded and Cyber Physical System Security Challenges and
                  Innovations},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {3},
  pages        = {235--236},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2017.2664183},
  doi          = {10.1109/TDSC.2017.2664183},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChooKAG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ColomboF17,
  author       = {Pietro Colombo and
                  Elena Ferrari},
  title        = {Enhancing MongoDB with Purpose-Based Access Control},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {6},
  pages        = {591--604},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2497680},
  doi          = {10.1109/TDSC.2015.2497680},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ColomboF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DimitriouK17,
  author       = {Tassos Dimitriou and
                  Ghassan O. Karame},
  title        = {Enabling Anonymous Authorization and Rewarding in the Smart Grid},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {565--572},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2496211},
  doi          = {10.1109/TDSC.2015.2496211},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DimitriouK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/EgeleSKV17,
  author       = {Manuel Egele and
                  Gianluca Stringhini and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Towards Detecting Compromised Accounts on Social Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {447--460},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2479616},
  doi          = {10.1109/TDSC.2015.2479616},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/EgeleSKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/El-AtawyDA17,
  author       = {Adel El{-}Atawy and
                  Qi Duan and
                  Ehab Al{-}Shaer},
  title        = {A Novel Class of Robust Covert Channels Using Out-of-Order Packets},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {116--129},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2443779},
  doi          = {10.1109/TDSC.2015.2443779},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/El-AtawyDA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ElmallahG17,
  author       = {Ehab S. Elmallah and
                  Mohamed G. Gouda},
  title        = {Hardness of Firewall Analysis},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {3},
  pages        = {339--349},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2455532},
  doi          = {10.1109/TDSC.2015.2455532},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ElmallahG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GoryczkaX17,
  author       = {Slawomir Goryczka and
                  Li Xiong},
  title        = {A Comprehensive Comparison of Multiparty Secure Additions with Differential
                  Privacy},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {463--477},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2484326},
  doi          = {10.1109/TDSC.2015.2484326},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GoryczkaX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuinBFT17,
  author       = {Ujjwal Guin and
                  Swarup Bhunia and
                  Domenic Forte and
                  Mark M. Tehranipoor},
  title        = {{SMA:} {A} System-Level Mutual Authentication for Protecting Electronic
                  Hardware and Firmware},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {3},
  pages        = {265--278},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2016.2615609},
  doi          = {10.1109/TDSC.2016.2615609},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GuinBFT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuoMSHWV17,
  author       = {Fuchun Guo and
                  Yi Mu and
                  Willy Susilo and
                  Homer Hsing and
                  Duncan S. Wong and
                  Vijay Varadharajan},
  title        = {Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight
                  Devices},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {211--220},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2445760},
  doi          = {10.1109/TDSC.2015.2445760},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GuoMSHWV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanCAL17,
  author       = {Yi Han and
                  Jeffrey Chan and
                  Tansu Alpcan and
                  Christopher Leckie},
  title        = {Using Virtual Machine Allocation Policies to Defend against Co-Resident
                  Attacks in Cloud Computing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {95--108},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2429132},
  doi          = {10.1109/TDSC.2015.2429132},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HanCAL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HerderRDYD17,
  author       = {Charles Herder and
                  Ling Ren and
                  Marten van Dijk and
                  Meng{-}Day (Mandel) Yu and
                  Srinivas Devadas},
  title        = {Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure
                  Physical Unclonable Functions},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {65--82},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2016.2536609},
  doi          = {10.1109/TDSC.2016.2536609},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HerderRDYD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HomescuJCBLF17,
  author       = {Andrei Homescu and
                  Todd Jackson and
                  Stephen Crane and
                  Stefan Brunthaler and
                  Per Larsen and
                  Michael Franz},
  title        = {Large-Scale Automated Software Diversity - Program Evolution Redux},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {158--171},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2433252},
  doi          = {10.1109/TDSC.2015.2433252},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HomescuJCBLF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/IllianoML17,
  author       = {Vittorio P. Illiano and
                  Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and
                  Emil C. Lupu},
  title        = {Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed
                  and Masked Events in Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {3},
  pages        = {279--293},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2016.2614505},
  doi          = {10.1109/TDSC.2016.2614505},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/IllianoML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiYHHLB17,
  author       = {Shouling Ji and
                  Shukun Yang and
                  Xin Hu and
                  Weili Han and
                  Zhigong Li and
                  Raheem A. Beyah},
  title        = {Zero-Sum Password Cracking Game: {A} Large-Scale Empirical Study on
                  the Crackability, Correlation, and Security of Passwords},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {550--564},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2481884},
  doi          = {10.1109/TDSC.2015.2481884},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JiYHHLB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Joye17,
  author       = {Marc Joye},
  title        = {Cryptanalysis of a Privacy-Preserving Aggregation Protocol},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {6},
  pages        = {693--694},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2016.2519889},
  doi          = {10.1109/TDSC.2016.2519889},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Joye17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KruppSZ17,
  author       = {Brian Krupp and
                  Nigamanth Sridhar and
                  Wenbing Zhao},
  title        = {{SPE:} Security and Privacy Enhancement Framework for Mobile Devices},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {433--446},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2465965},
  doi          = {10.1109/TDSC.2015.2465965},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KruppSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Kupcu17,
  author       = {Alptekin K{\"{u}}p{\c{c}}{\"{u}}},
  title        = {Incentivized Outsourced Computation Resistant to Malicious Contractors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {6},
  pages        = {633--649},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2499738},
  doi          = {10.1109/TDSC.2015.2499738},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Kupcu17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiSLSJ17,
  author       = {Jingwei Li and
                  Anna Cinzia Squicciarini and
                  Dan Lin and
                  Smitha Sundareswaran and
                  Chunfu Jia},
  title        = {MMB\({}^{\mbox{cloud}}\)-Tree: Authenticated Index for Verifiable
                  Cloud Service Selection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {185--198},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2445752},
  doi          = {10.1109/TDSC.2015.2445752},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiSLSJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiSZX17,
  author       = {Qi Li and
                  Ravi S. Sandhu and
                  Xinwen Zhang and
                  Mingwei Xu},
  title        = {Mandatory Content Access Control for Privacy Protection in Information
                  Centric Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {494--506},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2494049},
  doi          = {10.1109/TDSC.2015.2494049},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiSZX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuCCYP17,
  author       = {Hongbo Liu and
                  Yingying Chen and
                  Mooi Choo Chuah and
                  Jie Yang and
                  H. Vincent Poor},
  title        = {Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller
                  Switching},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {377--391},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2479624},
  doi          = {10.1109/TDSC.2015.2479624},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuCCYP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaZWLL17,
  author       = {Hui Ma and
                  Rui Zhang and
                  Zhiguo Wan and
                  Yao Lu and
                  Suqing Lin},
  title        = {Verifiable and Exculpable Outsourced Attribute-Based Encryption for
                  Access Control in Cloud Computing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {6},
  pages        = {679--692},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2499755},
  doi          = {10.1109/TDSC.2015.2499755},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaZWLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MoonLHKPK17,
  author       = {Hyungon Moon and
                  Hojoon Lee and
                  Ingoo Heo and
                  Kihwan Kim and
                  Yunheung Paek and
                  Brent ByungHoon Kang},
  title        = {Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {145--157},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2443803},
  doi          = {10.1109/TDSC.2015.2443803},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MoonLHKPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NadjiPA17,
  author       = {Yacin Nadji and
                  Roberto Perdisci and
                  Manos Antonakakis},
  title        = {Still Beheading Hydras: Botnet Takedowns Then and Now},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {535--549},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2496176},
  doi          = {10.1109/TDSC.2015.2496176},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/NadjiPA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PakC17,
  author       = {Wooguil Pak and
                  Young{-}June Choi},
  title        = {High Performance and High Scalable Packet Classification Algorithm
                  for Network Security Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {37--49},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2443773},
  doi          = {10.1109/TDSC.2015.2443773},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PakC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PilaramE17,
  author       = {Hossein Pilaram and
                  Taraneh Eghlidos},
  title        = {An Efficient Lattice Based Multi-Stage Secret Sharing Scheme},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {2--8},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2432800},
  doi          = {10.1109/TDSC.2015.2432800},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PilaramE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RabiehMAT17,
  author       = {Khaled Rabieh and
                  Mohamed M. E. A. Mahmoud and
                  Kemal Akkaya and
                  Samet Tonyali},
  title        = {Scalable Certificate Revocation Schemes for Smart Grid {AMI} Networks
                  Using Bloom Filters},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {420--432},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2467385},
  doi          = {10.1109/TDSC.2015.2467385},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/RabiehMAT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RahmanMAS17,
  author       = {Mohammad Ashiqur Rahman and
                  Mohammad Hossein Manshaei and
                  Ehab Al{-}Shaer and
                  Mohamed Shehab},
  title        = {Secure and Private Data Aggregation for Energy Consumption Scheduling
                  in Smart Grids},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {221--234},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2446492},
  doi          = {10.1109/TDSC.2015.2446492},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RahmanMAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RahulamathavanR17,
  author       = {Yogachandran Rahulamathavan and
                  Muttukrishnan Rajarajan},
  title        = {Efficient Privacy-Preserving Facial Expression Classification},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {3},
  pages        = {326--338},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2453963},
  doi          = {10.1109/TDSC.2015.2453963},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RahulamathavanR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RezaeiHS17,
  author       = {Fahimeh Rezaei and
                  Michael Hempel and
                  Hamid Sharif},
  title        = {Towards a Reliable Detection of Covert Timing Channels over Real-Time
                  Network Traffic},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {3},
  pages        = {249--264},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2017.2656078},
  doi          = {10.1109/TDSC.2017.2656078},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RezaeiHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShafiqGMPAKG17,
  author       = {Basit Shafiq and
                  Sameera Ghayyur and
                  Ammar Masood and
                  Zahid Pervaiz and
                  Abdulrahman Almutairi and
                  M. Farrukh Khan and
                  Arif Ghafoor},
  title        = {Composability Verification of Multi-Service Workflows in a Policy-Driven
                  Cloud Computing Environment},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {478--493},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2481881},
  doi          = {10.1109/TDSC.2015.2481881},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShafiqGMPAKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShinK17,
  author       = {SeongHan Shin and
                  Kazukuni Kobara},
  title        = {Security Analysis of Password-Authenticated Key Retrieval},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {573--576},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2490064},
  doi          = {10.1109/TDSC.2015.2490064},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShinK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SuSLDH17,
  author       = {Chunhua Su and
                  Bagus Santoso and
                  Yingjiu Li and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Universally Composable {RFID} Mutual Authentication},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {83--94},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2434376},
  doi          = {10.1109/TDSC.2015.2434376},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/SuSLDH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TianDBD17,
  author       = {Guanyu Tian and
                  Zhenhai Duan and
                  Todd Baumeister and
                  Yingfei Dong},
  title        = {A Traceback Attack on Freenet},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {3},
  pages        = {294--307},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2453983},
  doi          = {10.1109/TDSC.2015.2453983},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TianDBD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TilocaGDAD17,
  author       = {Marco Tiloca and
                  Domenico De Guglielmo and
                  Gianluca Dini and
                  Giuseppe Anastasi and
                  Sajal K. Das},
  title        = {{JAMMY:} {A} Distributed and Dynamic Solution to Selective Jamming
                  Attack in {TDMA} WSNs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {392--405},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2467391},
  doi          = {10.1109/TDSC.2015.2467391},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TilocaGDAD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangYLJZD17,
  author       = {Daibin Wang and
                  Haixia Yao and
                  Yingjiu Li and
                  Hai Jin and
                  Deqing Zou and
                  Robert H. Deng},
  title        = {A Secure, Usable, and Transparent Middleware for Permission Managers
                  on Android},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {350--362},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2479613},
  doi          = {10.1109/TDSC.2015.2479613},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangYLJZD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XiongS17,
  author       = {Hu Xiong and
                  Jianfei Sun},
  title        = {Comments on "Verifiable and Exculpable Outsourced Attribute-Based
                  Encryption for Access Control in Cloud Computing"},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {461--462},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2017.2710119},
  doi          = {10.1109/TDSC.2017.2710119},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XiongS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuGGFL17,
  author       = {Kaihe Xu and
                  Yuanxiong Guo and
                  Linke Guo and
                  Yuguang Fang and
                  Xiaolin Li},
  title        = {My Privacy My Decision: Control of Photo Sharing on Online Social
                  Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {199--210},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2443795},
  doi          = {10.1109/TDSC.2015.2443795},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuGGFL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangCC17,
  author       = {Zequ Yang and
                  Peng Cheng and
                  Jiming Chen},
  title        = {Learning-Based Jamming Attack against Low-Duty-Cycle Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {6},
  pages        = {650--663},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2501288},
  doi          = {10.1109/TDSC.2015.2501288},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YangCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangCZ17,
  author       = {Yuan Zhang and
                  Qingjun Chen and
                  Sheng Zhong},
  title        = {Efficient and Privacy-Preserving Min and \emph{k}th Min Computations
                  in Mobile Sensing Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {1},
  pages        = {9--21},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2432814},
  doi          = {10.1109/TDSC.2015.2432814},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangLL17,
  author       = {Peng Zhang and
                  Qi Li and
                  Patrick P. C. Lee},
  title        = {Achieving Content-Oriented Anonymity with {CRISP}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {6},
  pages        = {578--590},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2498603},
  doi          = {10.1109/TDSC.2015.2498603},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangLLLCWC17,
  author       = {Ji Zhang and
                  Hongzhou Li and
                  Xuemei Liu and
                  Yonglong Luo and
                  Fulong Chen and
                  Hua Wang and
                  Liang Chang},
  title        = {On Efficient and Robust Anonymization for Privacy Protection on Massive
                  Streaming Categorical Information},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {507--520},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2483503},
  doi          = {10.1109/TDSC.2015.2483503},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangLLLCWC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhengLLH17,
  author       = {Yao Zheng and
                  Ming Li and
                  Wenjing Lou and
                  Y. Thomas Hou},
  title        = {Location Based Handshake and Private Proximity Test with Location
                  Tags},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {406--419},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2472529},
  doi          = {10.1109/TDSC.2015.2472529},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhengLLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZilbermanPE17,
  author       = {Polina Zilberman and
                  Rami Puzis and
                  Yuval Elovici},
  title        = {On Network Footprint of Traffic Inspection and Filtering at Global
                  Scrubbing Centers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {521--534},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2494039},
  doi          = {10.1109/TDSC.2015.2494039},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZilbermanPE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics