Search dblp for Publications

export results for "toc:db/journals/tdsc/tdsc3.bht:"

 download as .bib file

@article{DBLP:journals/tdsc/ArlatBHV06,
  author       = {Jean Arlat and
                  Andrea Bondavalli and
                  Boudewijn R. Haverkort and
                  Paulo Ver{\'{\i}}ssimo},
  title        = {Guest Editorial for the Special Issue on the 2005 {IEEE/IFIP} Conference
                  on Dependable Systems and Networks, including the Dependable Computing
                  and Communications and Performance and Dependability Symposia},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {3},
  pages        = {169--171},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.36},
  doi          = {10.1109/TDSC.2006.36},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ArlatBHV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BadishiKS06,
  author       = {Gal Badishi and
                  Idit Keidar and
                  Amir Sasson},
  title        = {Exposing and Eliminating Vulnerabilities to Denial of Service Attacks
                  in Secure Gossip-Based Multicast},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {45--61},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.12},
  doi          = {10.1109/TDSC.2006.12},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BadishiKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BakerP06,
  author       = {Zachary K. Baker and
                  Viktor K. Prasanna},
  title        = {Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {4},
  pages        = {289--300},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.44},
  doi          = {10.1109/TDSC.2006.44},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BakerP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CiaramellaDSGT06,
  author       = {Angelo Ciaramella and
                  Paolo D'Arco and
                  Alfredo De Santis and
                  Clemente Galdi and
                  Roberto Tagliaferri},
  title        = {Neural Network Techniques for Proactive Password Checking},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {4},
  pages        = {327--339},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.53},
  doi          = {10.1109/TDSC.2006.53},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CiaramellaDSGT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DuDHV06,
  author       = {Wenliang Du and
                  Jing Deng and
                  Yunghsiang S. Han and
                  Pramod K. Varshney},
  title        = {A Key Predistribution Scheme for Sensor Networks Using Deployment
                  Knowledge},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {62--77},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.2},
  doi          = {10.1109/TDSC.2006.2},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DuDHV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FuWD06,
  author       = {Anthony Y. Fu and
                  Liu Wenyin and
                  Xiaotie Deng},
  title        = {Detecting Phishing Web Pages with Visual Similarity Assessment Based
                  on Earth Mover's Distance {(EMD)}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {4},
  pages        = {301--311},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.50},
  doi          = {10.1109/TDSC.2006.50},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FuWD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanWJ06,
  author       = {Junghee Han and
                  David Watson and
                  Farnam Jahanian},
  title        = {An Experimental Study of Internet Path Diversity},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {4},
  pages        = {273--288},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.43},
  doi          = {10.1109/TDSC.2006.43},
  timestamp    = {Sat, 18 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/HanWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Iyer06,
  author       = {Ravishankar K. Iyer},
  title        = {Editorial: Dependability and Security--Looking Foward to 2006},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {1},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.11},
  doi          = {10.1109/TDSC.2006.11},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Iyer06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiangCY06,
  author       = {Guofei Jiang and
                  Haifeng Chen and
                  Kenji Yoshihira},
  title        = {Modeling and Tracking of Transaction Flow Dynamics for Fault Detection
                  in Complex Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {4},
  pages        = {312--326},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.52},
  doi          = {10.1109/TDSC.2006.52},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JiangCY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KemperMT06,
  author       = {Peter Kemper and
                  Dennis M{\"{u}}ller and
                  Axel Th{\"{u}}mmler},
  title        = {Combining Response Surface Methodology with Numerical Methods for
                  Optimization of Markovian Models},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {3},
  pages        = {259--269},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.28},
  doi          = {10.1109/TDSC.2006.28},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KemperMT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KhannaVB06,
  author       = {Gunjan Khanna and
                  Padma Varadharajan and
                  Saurabh Bagchi},
  title        = {Automated Online Monitoring of Distributed Applications through External
                  Monitors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {2},
  pages        = {115--129},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.17},
  doi          = {10.1109/TDSC.2006.17},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KhannaVB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KimLCC06,
  author       = {Yoohwan Kim and
                  Wing Cheong Lau and
                  Mooi Choo Chuah and
                  H. Jonathan Chao},
  title        = {PacketScore: {A} Statistics-Based Packet Filtering Scheme against
                  Distributed Denial-of-Service Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {2},
  pages        = {141--155},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.25},
  doi          = {10.1109/TDSC.2006.25},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KimLCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiL06,
  author       = {Jiangtao Li and
                  Ninghui Li},
  title        = {OACerts: Oblivious Attribute Certificates},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {4},
  pages        = {340--352},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.54},
  doi          = {10.1109/TDSC.2006.54},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MartinA06,
  author       = {Jean{-}Philippe Martin and
                  Lorenzo Alvisi},
  title        = {Fast Byzantine Consensus},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {3},
  pages        = {202--215},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.35},
  doi          = {10.1109/TDSC.2006.35},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MartinA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MartinA06a,
  author       = {Jean{-}Philippe Martin and
                  Lorenzo Alvisi},
  title        = {Correction to "Fast Byzantine Consensus"},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {4},
  pages        = {400},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.45},
  doi          = {10.1109/TDSC.2006.45},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MartinA06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MizrakCMS06,
  author       = {Alper Tugay Mizrak and
                  Yuchung Cheng and
                  Keith Marzullo and
                  Stefan Savage},
  title        = {Detecting and Isolating Malicious Routers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {3},
  pages        = {230--244},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.34},
  doi          = {10.1109/TDSC.2006.34},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MizrakCMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NebenzahlSW06,
  author       = {Danny Nebenzahl and
                  Shmuel Sagiv and
                  Avishai Wool},
  title        = {Install-Time Vaccination of Windows Executables to Defend against
                  Stack Smashing Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {78--90},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.14},
  doi          = {10.1109/TDSC.2006.14},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/NebenzahlSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OzakiDOK06,
  author       = {Tatsuya Ozaki and
                  Tadashi Dohi and
                  Hiroyuki Okamura and
                  Naoto Kaio},
  title        = {Distribution-Free Checkpoint Placement Algorithms Based on Min-Max
                  Principle},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {2},
  pages        = {130--140},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.22},
  doi          = {10.1109/TDSC.2006.22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/OzakiDOK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PereiraMC06,
  author       = {Anil L. Pereira and
                  Vineela Muppavarapu and
                  Soon Myoung Chung},
  title        = {Role-Based Access Control for Grid Database Services Using the Community
                  Authorization Service},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {2},
  pages        = {156--166},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.26},
  doi          = {10.1109/TDSC.2006.26},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PereiraMC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PiromsopaE06,
  author       = {Krerk Piromsopa and
                  Richard J. Enbody},
  title        = {Secure Bit: Transparent, Hardware Buffer-Overflow Protection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {4},
  pages        = {365--376},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.56},
  doi          = {10.1109/TDSC.2006.56},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/PiromsopaE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RajagopalanHJS06,
  author       = {Mohan Rajagopalan and
                  Matti A. Hiltunen and
                  Trevor Jim and
                  Richard D. Schlichting},
  title        = {System Call Monitoring Using Authenticated System Calls},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {3},
  pages        = {216--229},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.41},
  doi          = {10.1109/TDSC.2006.41},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RajagopalanHJS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SchiperT06,
  author       = {Andr{\'{e}} Schiper and
                  Sam Toueg},
  title        = {From Set Membership to Group Membership: {A} Separation of Concerns},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {2--12},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.13},
  doi          = {10.1109/TDSC.2006.13},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SchiperT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SquicciariniBFR06,
  author       = {Anna Cinzia Squicciarini and
                  Elisa Bertino and
                  Elena Ferrari and
                  Indrakshi Ray},
  title        = {Achieving Privacy in Trust Negotiations with an Ontology-Based Approach},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {13--30},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.3},
  doi          = {10.1109/TDSC.2006.3},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SquicciariniBFR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SridharanATK06,
  author       = {Vilas Sridharan and
                  Hossein Asadi and
                  Mehdi Baradaran Tahoori and
                  David R. Kaeli},
  title        = {Reducing Data Cache Susceptibility to Soft Errors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {4},
  pages        = {353--364},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.55},
  doi          = {10.1109/TDSC.2006.55},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SridharanATK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/StrunkK06,
  author       = {Elisabeth A. Strunk and
                  John C. Knight},
  title        = {Dependability through Assured Reconfiguration in Embedded System Software},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {3},
  pages        = {172--187},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.33},
  doi          = {10.1109/TDSC.2006.33},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/StrunkK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ThummlerBT06,
  author       = {Axel Th{\"{u}}mmler and
                  Peter Buchholz and
                  Mikl{\'{o}}s Telek},
  title        = {A Novel Approach for Phase-Type Fitting with the {EM} Algorithm},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {3},
  pages        = {245--258},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.27},
  doi          = {10.1109/TDSC.2006.27},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ThummlerBT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VoraN06,
  author       = {Adnan Vora and
                  Mikhail Nesterenko},
  title        = {Secure Location Verification Using Radio Broadcast},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {4},
  pages        = {377--385},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.57},
  doi          = {10.1109/TDSC.2006.57},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/VoraN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangL06,
  author       = {Shyh{-}Yih Wang and
                  Chi{-}Sung Laih},
  title        = {Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment
                  Scheme},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {91--100},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.15},
  doi          = {10.1109/TDSC.2006.15},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangP06,
  author       = {Nicholas J. Wang and
                  Sanjay J. Patel},
  title        = {ReStore: Symptom-Based Soft Error Detection in Microprocessors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {3},
  pages        = {188--201},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.40},
  doi          = {10.1109/TDSC.2006.40},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XinidisCAAM06,
  author       = {Konstantinos Xinidis and
                  Ioannis Charitakis and
                  Spyros Antonatos and
                  Kostas G. Anagnostakis and
                  Evangelos P. Markatos},
  title        = {An Active Splitter Architecture for Intrusion Detection and Prevention},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {31--44},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.6},
  doi          = {10.1109/TDSC.2006.6},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XinidisCAAM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangDB06,
  author       = {Yanjiang Yang and
                  Robert H. Deng and
                  Feng Bao},
  title        = {A Practical Password-Based Two-Server Authentication and Key Exchange
                  System},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {2},
  pages        = {105--114},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.16},
  doi          = {10.1109/TDSC.2006.16},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YangDB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangLLF06,
  author       = {Yanchao Zhang and
                  Wei Liu and
                  Wenjing Lou and
                  Yuguang Fang},
  title        = {Securing Mobile Ad Hoc Networks with Certificateless Public Keys},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {4},
  pages        = {386--399},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.58},
  doi          = {10.1109/TDSC.2006.58},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangLLF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}