default search action
Search dblp for Publications
export results for "toc:db/journals/tdsc/tdsc4.bht:"
@article{DBLP:journals/tdsc/AhmedT07, author = {Ahmed Awad E. Ahmed and Issa Traor{\'{e}}}, title = {A New Biometric Technology Based on Mouse Dynamics}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {3}, pages = {165--179}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70207}, doi = {10.1109/TDSC.2007.70207}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AhmedT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AwerbuchKMPV07, author = {Baruch Awerbuch and Shay Kutten and Yishay Mansour and Boaz Patt{-}Shamir and George Varghese}, title = {A Time-Optimal Self-Stabilizing Synchronizer Using {A} Phase Clock}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {3}, pages = {180--190}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1007}, doi = {10.1109/TDSC.2007.1007}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AwerbuchKMPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BadishiHK07, author = {Gal Badishi and Amir Herzberg and Idit Keidar}, title = {Keeping Denial-of-Service Attackers in the Dark}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {3}, pages = {191--204}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70209}, doi = {10.1109/TDSC.2007.70209}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BadishiHK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BouabdallahS07, author = {Nizar Bouabdallah and Bruno Sericola}, title = {Introducing a Relative Priority for the Shared-Protection Schemes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {3}, pages = {205--215}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1008}, doi = {10.1109/TDSC.2007.1008}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BouabdallahS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BucciGLT07, author = {Marco Bucci and Luca Giancane and Raimondo Luzzi and Alessandro Trifiletti}, title = {A Dynamic and Differential {CMOS} Lookup Table with Data-Independent Power Consumption for Cryptographic Applications on Chip Cards}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {245--251}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70212}, doi = {10.1109/TDSC.2007.70212}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BucciGLT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaiHPP07, author = {Min Cai and Kai Hwang and Jianping Pan and Christos Papadopoulos}, title = {WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {88--104}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1000}, doi = {10.1109/TDSC.2007.1000}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaiHPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CervesatoM07, author = {Iliano Cervesato and Catherine Meadows}, title = {One Picture Is Worth a Dozen Connectives: {A} Fault-Tree Representation of {NPATRL} Security Requirements}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {3}, pages = {216--227}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70206}, doi = {10.1109/TDSC.2007.70206}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CervesatoM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Chien07, author = {Hung{-}Yu Chien}, title = {{SASI:} {A} New Ultralightweight {RFID} Authentication Protocol Providing Strong Authentication and Strong Integrity}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {337--340}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70226}, doi = {10.1109/TDSC.2007.70226}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Chien07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DantuCP07, author = {Ram Dantu and Jo{\~{a}}o W. Cangussu and Sudeep Patwardhan}, title = {Fast Worm Containment Using Feedback Control}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {119--136}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1002}, doi = {10.1109/TDSC.2007.1002}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DantuCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GashiPS07, author = {Ilir Gashi and Peter T. Popov and Lorenzo Strigini}, title = {Fault Tolerance via Diversity for Off-the-Shelf Products: {A} Study with {SQL} Database Servers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {280--294}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70208}, doi = {10.1109/TDSC.2007.70208}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GashiPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Gokhale07, author = {Swapna S. Gokhale}, title = {Architecture-Based Software Reliability Analysis: Overview and Limitations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {32--40}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.4}, doi = {10.1109/TDSC.2007.4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Gokhale07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GorenderMR07, author = {S{\'{e}}rgio Gorender and Raimundo Jos{\'{e}} de Ara{\'{u}}jo Mac{\^{e}}do and Michel Raynal}, title = {An Adaptive Programming Model for Fault-Tolerant Distributed Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {18--31}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.3}, doi = {10.1109/TDSC.2007.3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GorenderMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HaleemMCS07, author = {Mohamed A. Haleem and Chetan Nanjunda Mathur and Rajarathnam Chandramouli and K. P. Subbalakshmi}, title = {Opportunistic Encryption: {A} Trade-Off between Security and Throughput in Wireless Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {313--324}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70214}, doi = {10.1109/TDSC.2007.70214}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HaleemMCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HwangCCQ07, author = {Kai Hwang and Min Cai and Ying Chen and Min Qin}, title = {Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {41--55}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.9}, doi = {10.1109/TDSC.2007.9}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HwangCCQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HwangLL07, author = {Tzonelih Hwang and Kuo{-}Chang Lee and Chuan{-}Ming Li}, title = {Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {71--80}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.13}, doi = {10.1109/TDSC.2007.13}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HwangLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Iyer07, author = {Ravishankar K. Iyer}, title = {Editorial: Dependability and Security}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {85--87}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.070201}, doi = {10.1109/TDSC.2007.070201}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Iyer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KhannaCVBCV07, author = {Gunjan Khanna and Mike Yu Cheng and Padma Varadharajan and Saurabh Bagchi and Miguel P. Correia and Paulo Ver{\'{\i}}ssimo}, title = {Automated Rule-Based Diagnosis through a Distributed Monitor System}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {266--279}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70211}, doi = {10.1109/TDSC.2007.70211}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KhannaCVBCV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeeTPP07, author = {Jeremy Lee and Mohammad Tehranipoor and Chintan Patel and Jim Plusquellic}, title = {Securing Designs against Scan-Based Side-Channel Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {325--336}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70215}, doi = {10.1109/TDSC.2007.70215}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeeTPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PeisertBKM07, author = {Sean Peisert and Matt Bishop and Sidney Karin and Keith Marzullo}, title = {Analysis of Computer Intrusions Using Sequences of Function Calls}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {137--150}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1003}, doi = {10.1109/TDSC.2007.1003}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PeisertBKM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RamasamyAS07, author = {HariGovind V. Ramasamy and Adnan Agbaria and William H. Sanders}, title = {A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {1--17}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.2}, doi = {10.1109/TDSC.2007.2}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RamasamyAS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ReayBDM07, author = {Ian Reay and Patricia Beatty and Scott Dick and James Miller}, title = {A Survey and Analysis of the {P3P} Protocol's Agents, Adoption, Maintenance, and Future}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {151--164}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1004}, doi = {10.1109/TDSC.2007.1004}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ReayBDM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ScherrerLOBA07, author = {Antoine Scherrer and Nicolas Larrieu and Philippe Owezarski and Pierre Borgnat and Patrice Abry}, title = {Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {56--70}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.12}, doi = {10.1109/TDSC.2007.12}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ScherrerLOBA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SerafiniBS07, author = {Marco Serafini and Andrea Bondavalli and Neeraj Suri}, title = {Online Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {295--312}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70210}, doi = {10.1109/TDSC.2007.70210}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/SerafiniBS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuB07, author = {Xiaoxin Wu and Elisa Bertino}, title = {An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {4}, pages = {252--265}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70213}, doi = {10.1109/TDSC.2007.70213}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WuB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YuSL07, author = {Wei Yu and Yan Sun and K. J. Ray Liu}, title = {Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {3}, pages = {228--242}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1006}, doi = {10.1109/TDSC.2007.1006}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YuSL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZouTG07, author = {Cliff Changchun Zou and Donald F. Towsley and Weibo Gong}, title = {Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {105--118}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1001}, doi = {10.1109/TDSC.2007.1001}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZouTG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.