Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tdsc/tdsc14.bht:"
@article{DBLP:journals/tdsc/0001HHKSZ17, author = {Zhe Liu and Xinyi Huang and Zhi Hu and Muhammad Khurram Khan and Hwajeong Seo and Lu Zhou}, title = {On Emerging Family of Elliptic Curves to Secure Internet of Things: {ECC} Comes of Age}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {237--248}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2577022}, doi = {10.1109/TDSC.2016.2577022}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0001HHKSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AbdouMO17, author = {AbdelRahman Abdou and Ashraf Matrawy and Paul C. van Oorschot}, title = {{CPV:} Delay-Based Location Verification for the Internet}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {130--144}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2451614}, doi = {10.1109/TDSC.2015.2451614}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AbdouMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AndersonMRVM17, author = {James W. Anderson and Hein Meling and Alexander Rasmussen and Amin Vahdat and Keith Marzullo}, title = {Local Recovery for High Availability in Strongly Consistent Cloud Services}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {172--184}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2443781}, doi = {10.1109/TDSC.2015.2443781}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AndersonMRVM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AzarderakhshFGH17, author = {Reza Azarderakhsh and Dieter Fishbein and Gurleen Grewal and Shi Hu and David Jao and Patrick Longa and Rajeev Verma}, title = {Fast Software Implementations of Bilinear Pairings}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {605--619}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2507120}, doi = {10.1109/TDSC.2015.2507120}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AzarderakhshFGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BarazzuttiFMOR17, author = {Rapha{\"{e}}l Barazzutti and Pascal Felber and Hugues Mercier and Emanuel Onica and Etienne Rivi{\`{e}}re}, title = {Efficient and Confidentiality-Preserving Content-Based Publish/Subscribe with Prefiltering}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {308--325}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2449831}, doi = {10.1109/TDSC.2015.2449831}, timestamp = {Wed, 15 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BarazzuttiFMOR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Bertino17, author = {Elisa Bertino}, title = {The State of the Journal Editorial}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {1}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2634638}, doi = {10.1109/TDSC.2016.2634638}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Bertino17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Bertino17a, author = {Elisa Bertino}, title = {Editor's Note}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {577}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2017.2767518}, doi = {10.1109/TDSC.2017.2767518}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Bertino17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BhuiyanWWCLW17, author = {Md. Zakirul Alam Bhuiyan and Guojun Wang and Jie Wu and Jiannong Cao and Xuefeng Liu and Tian Wang}, title = {Dependable Structural Health Monitoring Using Wireless Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {363--376}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2469655}, doi = {10.1109/TDSC.2015.2469655}, timestamp = {Sat, 31 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BhuiyanWWCLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BissiasLLP17, author = {George Bissias and Brian Neil Levine and Marc Liberatore and Swagatika Prusty}, title = {Forensic Identification of Anonymous Sources in OneSwarm}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {620--632}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2497706}, doi = {10.1109/TDSC.2015.2497706}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BissiasLLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BonolaBPPM17, author = {Marco Bonola and Giuseppe Bianchi and Giulio Picierro and Salvatore Pontarelli and Marco Monaci}, title = {StreaMon: {A} Data-Plane Programming Abstraction for Software-Defined Stream Monitoring}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {664--678}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2499747}, doi = {10.1109/TDSC.2015.2499747}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BonolaBPPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BorchertSS17, author = {Christoph Borchert and Horst Schirmeier and Olaf Spinczyk}, title = {Generic Soft-Error Detection and Correction for Concurrent Data Structures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {22--36}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2427832}, doi = {10.1109/TDSC.2015.2427832}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BorchertSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CamaraLLVV17, author = {Javier C{\'{a}}mara and Rog{\'{e}}rio de Lemos and Nuno Laranjeiro and Rafael Ventura and Marco Vieira}, title = {Robustness-Driven Resilience Evaluation of Self-Adaptive Software Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {50--64}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2429128}, doi = {10.1109/TDSC.2015.2429128}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CamaraLLVV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChooKAG17, author = {Kim{-}Kwang Raymond Choo and Mehran Mozaffari Kermani and Reza Azarderakhsh and Manimaran Govindarasu}, title = {Emerging Embedded and Cyber Physical System Security Challenges and Innovations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {235--236}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2017.2664183}, doi = {10.1109/TDSC.2017.2664183}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChooKAG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ColomboF17, author = {Pietro Colombo and Elena Ferrari}, title = {Enhancing MongoDB with Purpose-Based Access Control}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {591--604}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2497680}, doi = {10.1109/TDSC.2015.2497680}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ColomboF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DimitriouK17, author = {Tassos Dimitriou and Ghassan O. Karame}, title = {Enabling Anonymous Authorization and Rewarding in the Smart Grid}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {565--572}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2496211}, doi = {10.1109/TDSC.2015.2496211}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DimitriouK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/EgeleSKV17, author = {Manuel Egele and Gianluca Stringhini and Christopher Kruegel and Giovanni Vigna}, title = {Towards Detecting Compromised Accounts on Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {447--460}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2479616}, doi = {10.1109/TDSC.2015.2479616}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/EgeleSKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/El-AtawyDA17, author = {Adel El{-}Atawy and Qi Duan and Ehab Al{-}Shaer}, title = {A Novel Class of Robust Covert Channels Using Out-of-Order Packets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {116--129}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2443779}, doi = {10.1109/TDSC.2015.2443779}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/El-AtawyDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ElmallahG17, author = {Ehab S. Elmallah and Mohamed G. Gouda}, title = {Hardness of Firewall Analysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {339--349}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2455532}, doi = {10.1109/TDSC.2015.2455532}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ElmallahG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GoryczkaX17, author = {Slawomir Goryczka and Li Xiong}, title = {A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {463--477}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2484326}, doi = {10.1109/TDSC.2015.2484326}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GoryczkaX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuinBFT17, author = {Ujjwal Guin and Swarup Bhunia and Domenic Forte and Mark M. Tehranipoor}, title = {{SMA:} {A} System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {265--278}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2615609}, doi = {10.1109/TDSC.2016.2615609}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuinBFT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuoMSHWV17, author = {Fuchun Guo and Yi Mu and Willy Susilo and Homer Hsing and Duncan S. Wong and Vijay Varadharajan}, title = {Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {211--220}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2445760}, doi = {10.1109/TDSC.2015.2445760}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GuoMSHWV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HanCAL17, author = {Yi Han and Jeffrey Chan and Tansu Alpcan and Christopher Leckie}, title = {Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {95--108}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2429132}, doi = {10.1109/TDSC.2015.2429132}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HanCAL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HerderRDYD17, author = {Charles Herder and Ling Ren and Marten van Dijk and Meng{-}Day (Mandel) Yu and Srinivas Devadas}, title = {Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {65--82}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2536609}, doi = {10.1109/TDSC.2016.2536609}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HerderRDYD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HomescuJCBLF17, author = {Andrei Homescu and Todd Jackson and Stephen Crane and Stefan Brunthaler and Per Larsen and Michael Franz}, title = {Large-Scale Automated Software Diversity - Program Evolution Redux}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {158--171}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2433252}, doi = {10.1109/TDSC.2015.2433252}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HomescuJCBLF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/IllianoML17, author = {Vittorio P. Illiano and Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and Emil C. Lupu}, title = {Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {279--293}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2614505}, doi = {10.1109/TDSC.2016.2614505}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/IllianoML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiYHHLB17, author = {Shouling Ji and Shukun Yang and Xin Hu and Weili Han and Zhigong Li and Raheem A. Beyah}, title = {Zero-Sum Password Cracking Game: {A} Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {550--564}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2481884}, doi = {10.1109/TDSC.2015.2481884}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JiYHHLB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Joye17, author = {Marc Joye}, title = {Cryptanalysis of a Privacy-Preserving Aggregation Protocol}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {693--694}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2016.2519889}, doi = {10.1109/TDSC.2016.2519889}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Joye17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KruppSZ17, author = {Brian Krupp and Nigamanth Sridhar and Wenbing Zhao}, title = {{SPE:} Security and Privacy Enhancement Framework for Mobile Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {433--446}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2465965}, doi = {10.1109/TDSC.2015.2465965}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KruppSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Kupcu17, author = {Alptekin K{\"{u}}p{\c{c}}{\"{u}}}, title = {Incentivized Outsourced Computation Resistant to Malicious Contractors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {633--649}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2499738}, doi = {10.1109/TDSC.2015.2499738}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Kupcu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiSLSJ17, author = {Jingwei Li and Anna Cinzia Squicciarini and Dan Lin and Smitha Sundareswaran and Chunfu Jia}, title = {MMB\({}^{\mbox{cloud}}\)-Tree: Authenticated Index for Verifiable Cloud Service Selection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {185--198}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2445752}, doi = {10.1109/TDSC.2015.2445752}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiSLSJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiSZX17, author = {Qi Li and Ravi S. Sandhu and Xinwen Zhang and Mingwei Xu}, title = {Mandatory Content Access Control for Privacy Protection in Information Centric Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {494--506}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2494049}, doi = {10.1109/TDSC.2015.2494049}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiSZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuCCYP17, author = {Hongbo Liu and Yingying Chen and Mooi Choo Chuah and Jie Yang and H. Vincent Poor}, title = {Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {377--391}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2479624}, doi = {10.1109/TDSC.2015.2479624}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuCCYP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaZWLL17, author = {Hui Ma and Rui Zhang and Zhiguo Wan and Yao Lu and Suqing Lin}, title = {Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {679--692}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2499755}, doi = {10.1109/TDSC.2015.2499755}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MaZWLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MoonLHKPK17, author = {Hyungon Moon and Hojoon Lee and Ingoo Heo and Kihwan Kim and Yunheung Paek and Brent ByungHoon Kang}, title = {Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {145--157}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2443803}, doi = {10.1109/TDSC.2015.2443803}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MoonLHKPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NadjiPA17, author = {Yacin Nadji and Roberto Perdisci and Manos Antonakakis}, title = {Still Beheading Hydras: Botnet Takedowns Then and Now}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {535--549}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2496176}, doi = {10.1109/TDSC.2015.2496176}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NadjiPA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PakC17, author = {Wooguil Pak and Young{-}June Choi}, title = {High Performance and High Scalable Packet Classification Algorithm for Network Security Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {37--49}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2443773}, doi = {10.1109/TDSC.2015.2443773}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PakC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PilaramE17, author = {Hossein Pilaram and Taraneh Eghlidos}, title = {An Efficient Lattice Based Multi-Stage Secret Sharing Scheme}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {2--8}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2432800}, doi = {10.1109/TDSC.2015.2432800}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PilaramE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RabiehMAT17, author = {Khaled Rabieh and Mohamed M. E. A. Mahmoud and Kemal Akkaya and Samet Tonyali}, title = {Scalable Certificate Revocation Schemes for Smart Grid {AMI} Networks Using Bloom Filters}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {420--432}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2467385}, doi = {10.1109/TDSC.2015.2467385}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/RabiehMAT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RahmanMAS17, author = {Mohammad Ashiqur Rahman and Mohammad Hossein Manshaei and Ehab Al{-}Shaer and Mohamed Shehab}, title = {Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {221--234}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2446492}, doi = {10.1109/TDSC.2015.2446492}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RahmanMAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RahulamathavanR17, author = {Yogachandran Rahulamathavan and Muttukrishnan Rajarajan}, title = {Efficient Privacy-Preserving Facial Expression Classification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {326--338}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2453963}, doi = {10.1109/TDSC.2015.2453963}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RahulamathavanR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RezaeiHS17, author = {Fahimeh Rezaei and Michael Hempel and Hamid Sharif}, title = {Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {249--264}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2017.2656078}, doi = {10.1109/TDSC.2017.2656078}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RezaeiHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShafiqGMPAKG17, author = {Basit Shafiq and Sameera Ghayyur and Ammar Masood and Zahid Pervaiz and Abdulrahman Almutairi and M. Farrukh Khan and Arif Ghafoor}, title = {Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {478--493}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2481881}, doi = {10.1109/TDSC.2015.2481881}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShafiqGMPAKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShinK17, author = {SeongHan Shin and Kazukuni Kobara}, title = {Security Analysis of Password-Authenticated Key Retrieval}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {573--576}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2490064}, doi = {10.1109/TDSC.2015.2490064}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShinK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SuSLDH17, author = {Chunhua Su and Bagus Santoso and Yingjiu Li and Robert H. Deng and Xinyi Huang}, title = {Universally Composable {RFID} Mutual Authentication}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {83--94}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2434376}, doi = {10.1109/TDSC.2015.2434376}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/SuSLDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TianDBD17, author = {Guanyu Tian and Zhenhai Duan and Todd Baumeister and Yingfei Dong}, title = {A Traceback Attack on Freenet}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {3}, pages = {294--307}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2453983}, doi = {10.1109/TDSC.2015.2453983}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TianDBD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TilocaGDAD17, author = {Marco Tiloca and Domenico De Guglielmo and Gianluca Dini and Giuseppe Anastasi and Sajal K. Das}, title = {{JAMMY:} {A} Distributed and Dynamic Solution to Selective Jamming Attack in {TDMA} WSNs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {392--405}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2467391}, doi = {10.1109/TDSC.2015.2467391}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TilocaGDAD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangYLJZD17, author = {Daibin Wang and Haixia Yao and Yingjiu Li and Hai Jin and Deqing Zou and Robert H. Deng}, title = {A Secure, Usable, and Transparent Middleware for Permission Managers on Android}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {350--362}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2479613}, doi = {10.1109/TDSC.2015.2479613}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangYLJZD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XiongS17, author = {Hu Xiong and Jianfei Sun}, title = {Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing"}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {461--462}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2017.2710119}, doi = {10.1109/TDSC.2017.2710119}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XiongS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuGGFL17, author = {Kaihe Xu and Yuanxiong Guo and Linke Guo and Yuguang Fang and Xiaolin Li}, title = {My Privacy My Decision: Control of Photo Sharing on Online Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {199--210}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2443795}, doi = {10.1109/TDSC.2015.2443795}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/XuGGFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangCC17, author = {Zequ Yang and Peng Cheng and Jiming Chen}, title = {Learning-Based Jamming Attack against Low-Duty-Cycle Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {650--663}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2501288}, doi = {10.1109/TDSC.2015.2501288}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangCZ17, author = {Yuan Zhang and Qingjun Chen and Sheng Zhong}, title = {Efficient and Privacy-Preserving Min and \emph{k}th Min Computations in Mobile Sensing Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {1}, pages = {9--21}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2432814}, doi = {10.1109/TDSC.2015.2432814}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangLL17, author = {Peng Zhang and Qi Li and Patrick P. C. Lee}, title = {Achieving Content-Oriented Anonymity with {CRISP}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {6}, pages = {578--590}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2498603}, doi = {10.1109/TDSC.2015.2498603}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangLLLCWC17, author = {Ji Zhang and Hongzhou Li and Xuemei Liu and Yonglong Luo and Fulong Chen and Hua Wang and Liang Chang}, title = {On Efficient and Robust Anonymization for Privacy Protection on Massive Streaming Categorical Information}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {507--520}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2483503}, doi = {10.1109/TDSC.2015.2483503}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangLLLCWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhengLLH17, author = {Yao Zheng and Ming Li and Wenjing Lou and Y. Thomas Hou}, title = {Location Based Handshake and Private Proximity Test with Location Tags}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {406--419}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2472529}, doi = {10.1109/TDSC.2015.2472529}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhengLLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZilbermanPE17, author = {Polina Zilberman and Rami Puzis and Yuval Elovici}, title = {On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {5}, pages = {521--534}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2494039}, doi = {10.1109/TDSC.2015.2494039}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZilbermanPE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.