default search action
IEEE Transactions on Dependable and Secure Computing, Volume 8
Volume 8, Number 1, January - February 2011
- Beat Gfeller, Nicola Santoro, Peter Widmayer:
A Distributed Algorithm for Finding All Best Swap Edges of a Minimum-Diameter Spanning Tree. 1-12 - Claudio A. Ardagna, Marco Cremonini, Sabrina De Capitani di Vimercati, Pierangela Samarati:
An Obfuscation-Based Approach for Protecting Location Privacy. 13-27 - Xiaohu Li, Timothy Paul Parker, Shouhuai Xu:
A Stochastic Model for Quantitative Security Analyses of Networked Systems. 28-43 - Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Automated Derivation of Application-Aware Error Detectors Using Static Analysis: The Trusted Illiac Approach. 44-57 - Bezawada Bruhadeshwar, Sandeep S. Kulkarni:
Balancing Revocation and Storage Trade-Offs in Secure Group Communication. 58-73 - Dong Xiang:
Deadlock-Free Adaptive Routing in Meshes with Fault-Tolerance Ability Based on Channel Overlapping. 74-88 - Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. 89-103 - Paolo Romano, Francesco Quaglia:
Providing e-Transaction Guarantees in Asynchronous Systems with No Assumptions on the Accuracy of Failure Detection. 104-121 - Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo:
RITAS: Services for Randomized Intrusion Tolerance. 122-136 - Feng Wang, Yuan Xie:
Soft Error Rate Analysis for Combinational Logic Using an Accurate Electrical Masking Model. 137-146 - Dmitry Rovniagin, Avishai Wool:
The Geometric Efficient Matching Algorithm for Firewalls. 147-159
Volume 8, Number 2, March - April 2011
- Ing-Ray Chen, Anh Phan Speer, Mohamed Eltoweissy:
Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks. 161-176 - Marco Serafini, Péter Bokor, Neeraj Suri, Jonny Vinter, Astrit Ademaj, Wolfgang Brandstätter, Fulvio Tagliabo, Jens Koch:
Application-Level Diagnostic and Membership Protocols for Generic Time-Triggered Systems. 177-193 - Dennis Heimbigner:
A Tamper-Resistant Programming Language System. 194-206 - Jacques Henri Collet, Piotr Zajac, Mihalis Psarakis, Dimitris Gizopoulos:
Chip Self-Organization and Fault Tolerance in Massively Defective Multicore Arrays. 207-217 - Jelena Mirkovic, Ezra Kissel:
Comparative Evaluation of Spoofing Defenses. 218-232 - John Felix Charles Joseph, Bu-Sung Lee, Amitabha Das, Boon-Chong Seet:
Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA. 233-245 - Sun-Yuan Hsieh, Chia-Wei Lee:
Diagnosability of Two-Matching Composition Networks under the MMast Model. 246-255 - Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sean W. Smith:
Nymble: Blocking Misbehaving Users in Anonymizing Networks. 256-269 - Sascha Grau, Mathias Fischer, Michael Brinkmeier, Günter Schäfer:
On Complexity and Approximability of Optimal DoS Attacks on Multiple-Tree P2P Streaming Topologies. 270-281 - Alexander Hofmann, Bernhard Sick:
Online Intrusion Alert Aggregation with Generative Data Stream Modeling. 282-294 - Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fang:
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks. 295-307 - Marta Portela-García, Celia López-Ongil, Mario García-Valderas, Luis Entrena:
Fault Injection in Modern Microprocessors Using On-Chip Debugging Infrastructures. 308-314 - Hung-Min Sun, Wei-Chih Ting, King-Hang Wang:
On the Security of Chien's Ultralightweight RFID Authentication Protocol. 315-317
Volume 8, Number 3, May - June 2011
- Gang Xu, Cristian Borcea, Liviu Iftode:
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks. 321-336 - Jianneng Cao, Barbara Carminati, Elena Ferrari, Kian-Lee Tan:
CASTLE: Continuously Anonymizing Data Streams. 337-352 - Chia-Wei Lee, Sun-Yuan Hsieh:
Determining the Diagnosability of (1, 2)-Matching Composition Networks and Its Applications. 353-362 - Kealan McCusker, Noel E. O'Connor:
Low-Energy Symmetric Key Distribution in Wireless Sensor Networks. 363-376 - Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao:
Modeling and Detection of Camouflaging Worm. 377-390 - Refik Samet:
Recovery Device for Real-Time Dual-Redundant Computer Systems. 391-403 - K. K. Rao, James Lee Hafner, Richard A. Golding:
Reliability for Networked Storage Nodes. 404-418 - Cyrus Harvesf, Douglas M. Blough:
Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables. 419-433 - Xinyuan Wang, Douglas S. Reeves:
Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking. 434-449 - Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia:
Securing Topology Maintenance Protocols for Sensor Networks. 450-465 - Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa:
The F_f-Family of Protocols for RFID-Privacy and Authentication. 466-480
Volume 8, Number 4, July - August 2011
- Ge-Ming Chiu, Jane-Ferng Chiu:
A New Diskless Checkpointing Approach for Multiple Processor Failures. 481-493 - Federico Simmross-Wattenberg, Juan I. Asensio-Pérez, Pablo Casaseca-de-la-Higuera, Marcos Martín-Fernández, Ioannis A. Dimitriadis, Carlos Alberola-López:
Anomaly Detection in Network Traffic Based on Statistical Inference and alpha-Stable Modeling. 494-509 - Miao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward:
Efficient Fault Detection and Diagnosis in Complex Software Systems with Information-Theoretic Monitoring. 510-522 - Issa Khalil:
ELMO: Energy Aware Local Monitoring in Sensor Networks. 523-536 - Ilia Polian, John P. Hayes, Sudhakar M. Reddy, Bernd Becker:
Modeling and Mitigating Transient Errors in Logic Circuits. 537-547 - Paolo D'Arco, Alfredo De Santis:
On Ultralightweight RFID Authentication Protocols. 548-563 - Yair Amir, Brian A. Coan, Jonathan Kirsch, John Lane:
Prime: Byzantine Replication under Attack. 564-577 - Alberto Trombetta, Wei Jiang, Elisa Bertino, Lorenzo Bossi:
Privacy-Preserving Updates to Anonymous and Confidential Databases. 578-587 - Babak Salamat, Todd Jackson, Gregor Wagner, Christian Wimmer, Michael Franz:
Runtime Defense against Code Injection Attacks Using Replicated Execution. 588-601 - Christopher Ferguson, Qijun Gu:
Self-Healing Control Flow Protection in Sensor Applications. 602-616 - Krishna K. Ramachandran, Biplab Sikdar:
Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks. 617-623
Volume 8, Number 5, September - October 2011
- Richard Ekwall, André Schiper:
A Fault-Tolerant Token-Based Atomic Broadcast Algorithm. 625-639 - Karthik Pattabiraman, Giacinto Paolo Saggese, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Automated Derivation of Application-Specific Error Detectors Using Dynamic Analysis. 640-655 - Hao Yang, Eric Osterweil, Daniel Massey, Songwu Lu, Lixia Zhang:
Deploying Cryptography in Internet-Scale Systems: A Case Study on DNSSEC. 656-669 - Arati Baliga, Vinod Ganapathy, Liviu Iftode:
Detecting Kernel-Level Rootkits Using Data Structure Invariants. 670-684 - Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini, Alessandro Mei:
Distributed Detection of Clone Attacks in Wireless Sensor Networks. 685-698 - Ali Al Shidhani, Victor C. M. Leung:
Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers. 699-713 - Omer Khan, Sandip Kundu:
Hardware/Software Codesign Architecture for Online Testing in Chip Multiprocessors. 714-727 - Robin Snader, Nikita Borisov:
Improving Security and Performance in the Tor Network through Tunable Path Selection. 728-741 - Carmela Troncoso, George Danezis, Eleni Kosta, Josep Balasch, Bart Preneel:
PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance. 742-755 - Yu Wang, Hong Luo, Ku He, Rong Luo, Huazhong Yang, Yuan Xie:
Temperature-Aware NBTI Modeling and the Impact of Standby Leakage Reduction Techniques on Circuit Performance Degradation. 756-769 - Tieyan Li, Guilin Wang:
Analyzing a Family of Key Protection Schemes against Modification Attacks. 770-776 - Dionysia K. Petraki, Markos P. Anastasopoulos, Symeon Papavassiliou:
Secrecy Capacity for Satellite Networks under Rain Fading. 777-782
Volume 8, Number 6, November - December 2011
- Steven Gianvecchio, Haining Wang:
An Entropy-Based Approach to Detecting Covert Timing Channels. 785-797 - Juan A. Carrasco, Víctor Suñé:
A Numerical Method for the Evaluation of the Distribution of Cumulative Reward till Exit of a Subset of Transient States of a Markov Reward Model. 798-809 - Zheng Yan, Christian Prehofer:
Autonomic Trust Management for a Component-Based Software System. 810-823 - Levente Buttyán, László Czap, István Vajda:
Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes. 824-838 - Kenichi Kourai, Shigeru Chiba:
Fast Software Rejuvenation of Virtual Machine Monitors. 839-851 - Hejiao Huang, Hélène Kirchner:
Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets. 852-865 - Vadim Drabkin, Roy Friedman, Gabriel Kliot, Marc Segal:
On Reliable Dissemination in Wireless Ad Hoc Networks. 866-882 - Yuqing Sun, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah:
On the Complexity of Authorization in RBAC under Qualification and Security Constraints. 883-897 - Giorgio Calandriello, Panos Papadimitratos, Jean-Pierre Hubaux, Antonio Lioy:
On the Performance of Secure Vehicular Communication Systems. 898-912 - Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, Richard D. Schlichting:
Probabilistic Model-Driven Recovery in Distributed Systems. 913-928 - Jiang Wu, Douglas R. Stinson:
Three Improved Algorithms for Multipath Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission. 929-937 - Senthilkumar Chinnappa Gounder Periaswamy, Dale R. Thompson, Jia Di:
Fingerprinting RFID Tags. 938-943
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.