


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 16
Volume 16, Number 1, January - February 2019
- Jaideep Vaidya
:
Editorial. 1-4 - Satyajayant Misra, Reza Tourani
, Frank Natividad, Travis Mick, Nahid Ebrahimi Majd, Hong Huang:
AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge. 5-17 - Syed Kamran Haider
, Chenglu Jin
, Masab Ahmad
, Devu Manikantan Shila
, Omer Khan
, Marten van Dijk
:
Advancing the State-of-the-Art in Hardware Trojans Detection. 18-32 - Erman Ayday
, Qiang Tang
, Arif Yilmaz:
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data. 33-43 - Xiaoguang Wang
, Yong Qi, Zhi Wang, Yue Chen, Yajin Zhou:
Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems. 44-57 - Aaron S. Pope
, Daniel R. Tauritz
, Alexander D. Kent:
Evolving Bipartite Authentication Graph Partitions. 58-71 - Yannan Li
, Yong Yu
, Geyong Min
, Willy Susilo
, Jianbing Ni, Kim-Kwang Raymond Choo
:
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems. 72-83 - Nathalie Baracaldo
, Balaji Palanisamy, James Joshi:
G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework. 84-98 - Tobias Wüchner
, Aleksander Cislak, Martín Ochoa
, Alexander Pretschner:
Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection. 99-112 - Yingyuan Yang
, Jinyuan Sun, Linke Guo
:
PersonaIA: A Lightweight Implicit Authentication System Based on Customized User Behavior Selection. 113-126 - Yongwang Zhao
, David Sanán
, Fuyuan Zhang, Yang Liu
:
Refinement-Based Specification and Security Analysis of Separation Kernels. 127-141 - Tianbo Wang, Chunhe Xia, Sheng Wen, Hui Xue, Yang Xiang
, Shouzhong Tu:
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks. 142-155 - Chenglu Jin
, Marten van Dijk
:
Secure and Efficient Initialization and Authentication Protocols for SHIELD. 156-173 - Muffy Calder
, Michele Sevegnani
:
Stochastic Model Checking for Predicting Component Failures and Service Availability. 174-187
Volume 16, Number 2, March - April 2019
- Dimitris Mitropoulos
, Panos Louridas, Michalis Polychronakis
, Angelos Dennis Keromytis:
Defending Against Web Application Attacks: Approaches, Challenges and Implications. 188-203 - Ling Ren
, Christopher W. Fletcher, Albert Kwon, Marten van Dijk
, Srinivas Devadas:
Design and Implementation of the Ascend Secure Processor. 204-216 - Martine De Cock
, Rafael Dowsley
, Caleb Horst, Raj S. Katti, Anderson C. A. Nascimento
, Wing-Sea Poon, Stacey Truex:
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation. 217-230 - Luis Munoz-Gonzalez
, Daniele Sgandurra, Martín Barrère
, Emil C. Lupu:
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs. 231-244 - Boyang Wang
, Ming Li
, Li Xiong
:
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data. 245-258 - Dong Xiang
, Bing Li, Yi Fu:
Fault-Tolerant Adaptive Routing in Dragonfly Networks. 259-271 - Xiao Lan
, Jing Xu, Zhenfeng Zhang, Wen-Tao Zhu:
Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3. 272-286 - Hojoon Lee
, Hyungon Moon, Ingoo Heo, DaeHee Jang, Jinsoo Jang
, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang:
KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object. 287-300 - Gregory Levitin
, Liudong Xing
, Yuanshun Dai:
Optimal Spot-Checking for Collusion Tolerance in Computer Grids. 301-312 - Gergely Ács
, Mauro Conti
, Paolo Gasti
, Cesar Ghali
, Gene Tsudik, Christopher A. Wood
:
Privacy-Aware Caching in Information-Centric Networking. 313-328 - Emre Yilmaz
, Hakan Ferhatosmanoglu, Erman Ayday
, Remzi Can Aksoy:
Privacy-Preserving Aggregate Queries for Optimal Location Selection. 329-343 - Xiaofeng Ding
, Peng Liu
, Hai Jin
:
Privacy-Preserving Multi-Keyword Top-$k$ k Similarity Search Over Encrypted Data. 344-357 - Ranjan Pal
, Leana Golubchik, Konstantinos Psounis
, Pan Hui
:
Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets. 358-372
Volume 16, Number 3, May - June 2019
- Chip-Hong Chang
, Marten van Dijk
, Ulrich Rührmair, Mark M. Tehranipoor:
Emerging Attacks and Solutions for Secure Hardware in the Internet of Things. 373-375 - Ali Akbar Pammu
, Kwen-Siong Chong
, Yi Wang
, Bah-Hwee Gwee
:
A Highly Efficient Side Channel Attack with Profiling through Relevance-Learning on Physical Leakage Information. 376-387 - Bilgiday Yuce
, Chinmay Deshpande, Marjan Ghodrati, Abhishek Bendre
, Leyla Nazhandali, Patrick Schaumont
:
A Secure Exception Mode for Fault-Attack-Resistant Processing. 388-401 - Qian Wang
, Gang Qu
:
A Silicon PUF Based Entropy Pump. 402-414 - Pieter Maene
, Johannes Götzfried, Tilo Müller, Ruan de Clercq, Felix C. Freiling
, Ingrid Verbauwhede
:
Atlas: Application Confidentiality in Compromised Embedded Systems. 415-423 - Urbi Chatterjee
, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
, Debashis Mahata
, Mukesh M. Prabhu
:
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database. 424-437 - Le Guan
, Chen Cao, Peng Liu
, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. 438-453 - Wei Li
, Linfeng Liao, Dawu Gu, Chaoyun Li
, Chenyu Ge, Zheng Guo, Ya Liu, Zhiqiang Liu
:
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things. 454-461 - André Schaller, Wenjie Xiong
, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Boris Skoric
, Stefan Katzenbeisser, Jakub Szefer
:
Decay-Based DRAM PUFs in Commodity Devices. 462-475 - Huiyun Li
, Cuiping Shao
, Zheng Wang
:
Detecting Fault Injection Attacks Based on Compressed Sensing and Integer Linear Programming. 476-483 - Yiran Shen
, Hongkai Wen, Chengwen Luo
, Weitao Xu
, Tao Zhang
, Wen Hu
, Daniela Rus:
GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait. 484-497 - Marc Fyrbiak
, Sebastian Wallat, Pawel Swierczynski
, Max Hoffmann
, Sebastian Hoppach
, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
:
HAL - The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion. 498-510 - Hila Rabii, Yaara Neumeier
, Osnat Keren
:
High Rate Robust Codes with Low Implementation Complexity. 511-520 - Zhe Liu
, Hwajeong Seo, Aniello Castiglione
, Kim-Kwang Raymond Choo
, Howon Kim:
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things. 521-529 - S. Abhishek Anand
, Nitesh Saxena:
Noisy Vibrational Pairing of IoT Devices. 530-545
Volume 16, Number 4, July - August 2019
- Vasileios Karyotis
:
A Markov Random Field Framework for Modeling Malware Propagation in Complex Communications Networks. 551-564 - Jonathan Chase
, Dusit Niyato
, Ping Wang
, Sivadon Chaisiri, Ryan K. L. Ko
:
A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing. 565-579 - Yuichi Sei
, Hiroshi Okumura, Takao Takenouchi, Akihiko Ohsuga:
Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness. 580-593 - Shouling Ji
, Ting Wang, Jianhai Chen, Weiqing Li, Prateek Mittal, Raheem Beyah
:
De-SAG: On the De-Anonymization of Structure-Attribute Graph Data. 594-607 - Aydin Abadi
, Sotirios Terzis
, Roberto Metere
, Changyu Dong
:
Efficient Delegated Private Set Intersection on Outsourced Private Datasets. 608-624 - Rui Zhang, Yuting Xiao
, Shuzhou Sun, Hui Ma
:
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications. 625-634 - Guido Lena Cota
, Sonia Ben Mokhtar
, Gabriele Gianini, Ernesto Damiani, Julia Lawall, Gilles Muller, Lionel Brunie:
RACOON++: A Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems. 635-650 - Hamed Farbeh
, Fereshte Mozafari, Masoume Zabihi, Seyed Ghassem Miremadi
:
RAW-Tag: Replicating in Altered Cache Ways for Correcting Multiple-Bit Errors in Tag Array. 651-664 - Chongxi Bao
, Ankur Srivastava
:
Reducing Timing Side-Channel Information Leakage Using 3D Integration. 665-678 - Jianwei Qian
, Xiang-Yang Li
, Chunhong Zhang, Linlin Chen, Taeho Jung, Junze Han
:
Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model. 679-692 - Cai Fu
, Xiao-Yang Liu
, Jia Yang, Laurence T. Yang
, Shui Yu
, Tianqing Zhu
:
Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks. 693-710 - Ambra Demontis
, Marco Melis
, Battista Biggio
, Davide Maiorca
, Daniel Arp, Konrad Rieck, Igino Corona
, Giorgio Giacinto
, Fabio Roli
:
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. 711-724 - Fang-Yu Rao
:
On the Security of a Variant of ElGamal Encryption Scheme. 725-728
Volume 16, Number 5, September - October 2019
- Raphael C.-W. Phan, Moti Yung:
Paradigm Shifts in Cryptographic Engineering. 729-730 - Russell W. F. Lai
, Kam-Fung Cheung
, Sherman S. M. Chow
, Anthony Man-Cho So
:
Another Look at Anonymous Communication. 731-742 - Myungsun Kim
, Hyung Tae Lee
, San Ling
, Benjamin Hong Meng Tan
, Huaxiong Wang:
Private Compound Wildcard Queries Using Fully Homomorphic Encryption. 743-756 - Akshima, Donghoon Chang, Aarushi Goel, Sweta Mishra
, Somitra Kumar Sanadhya
:
Generation of Secure and Reliable Honeywords, Preventing False Detection. 757-769 - Maliheh Shirvanian
, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
Building and Studying a Password Store that Perfectly Hides Passwords from Itself. 770-782 - Georg T. Becker
:
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory versus Practice. 783-795 - Margarita Osadchy
, Orr Dunkelman
:
It is All in the System's Parameters: Privacy and Security Issues in Transforming Biometric Raw Data into Binary Strings. 796-804 - Pawel Lorek
, Filip Zagórski
, Michal Kulis:
Strong Stationary Times and its use in Cryptography. 805-818 - Muhammad Umer Arshad
, Muhamad Felemban
, Zahid Pervaiz
, Arif Ghafoor
, Walid G. Aref
:
A Privacy Mechanism for Access Controlled Graph Data. 819-832 - Zhenfu Cao, Hongbing Wang
, Yunlei Zhao:
AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications. 833-842 - Liwei Zhang, A. Adam Ding
, Yunsi Fei
, Pei Luo
:
Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points. 843-855 - Domenico Cotroneo
, Andrea Paudice, Antonio Pecchia
:
Empirical Analysis and Validation of Security Alerts Filtering Techniques. 856-870 - Mohamed Mahmoud
, Khaled Rabieh, Ahmed B. T. Sherif, Enahoro Oriero, Muhammad Ismail
, Erchin Serpedin
, Khalid A. Qaraqe
:
Privacy-Preserving Fine-Grained Data Retrieval Schemes for Mobile Social Networks. 871-884 - Mahmoud Ammar
, Bruno Crispo, Bart Jacobs
, Danny Hughes, Wilfried Daniels:
SμV - The Security MicroVisor: A Formally-Verified Software-Based Security Architecture for the Internet of Things. 885-901 - Amir Jalali
, Reza Azarderakhsh
, Mehran Mozaffari Kermani
, David Jao
:
Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM. 902-912
Volume 16, Number 6, November - December 2019
- Gail-Joon Ahn
, Guofei Gu, Hongxin Hu
, Seungwon Shin
:
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies. 913-914 - Qi Li
, Xiaoyue Zou
, Qun Huang
, Jing Zheng
, Patrick P. C. Lee
:
Dynamic Packet Forwarding Verification in SDN. 915-929 - Qingjun Chen
, Shouqian Shi, Xin Li
, Chen Qian, Sheng Zhong:
SDN-Based Privacy Preserving Cross Domain Routing. 930-943 - Juan Wang
, Ru Wen
, Jiangqi Li, Fei Yan
, Bo Zhao, Fajiang Yu:
Detecting and Mitigating Target Link-Flooding Attacks Using SDN. 944-956 - Wiem Abderrahim
, Zièd Choukair:
Dependability Integration in Cloud-hosted Telecommunication Services. 957-968 - Anca Jurcut
, Tom Coffey, Reiner Dojen
:
A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks. 969-983 - Sancheng Peng, Guojun Wang, Yongmei Zhou, Cong Wan, Cong Wang, Shui Yu, Jianwei Niu:
An Immunization Framework for Social Networks Through Big Data Based Influence Modeling. 984-995 - Jian Shen
, Tianqi Zhou
, Debiao He
, Yuexin Zhang, Xingming Sun, Yang Xiang
:
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing. 996-1010 - Sandeep Pisharody
, Janakarajan Natarajan, Ankur Chowdhary
, Abdullah Alshalan
, Dijiang Huang
:
Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments. 1011-1025 - Xiaojing Liao
, Preethi Srinivasan, David Formby
, Raheem A. Beyah
:
Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid. 1026-1039 - Song Gao, Manar Mohamed
, Nitesh Saxena, Chengcui Zhang:
Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures. 1040-1053 - Xiao Han
, Hailiang Huang
, Leye Wang
:
F-PAD: Private Attribute Disclosure Risk Estimation in Online Social Networks. 1054-1069 - Giorgos Kappes
, Andromachi Hatzieleftheriou, Stergios V. Anastasiadis
:
Multitenant Access Control for Cloud-Aware Distributed Filesystems. 1070-1085 - Limei Lin
, Li Xu
, Riqing Chen
, Sun-Yuan Hsieh
, Dajin Wang:
Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks. 1086-1097

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.