


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 16
Volume 16, Number 1, January - February 2019
- Jaideep Vaidya

:
Editorial. 1-4 - Satyajayant Misra, Reza Tourani

, Frank Natividad, Travis Mick, Nahid Ebrahimi Majd, Hong Huang:
AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge. 5-17 - Syed Kamran Haider

, Chenglu Jin
, Masab Ahmad
, Devu Manikantan Shila
, Omer Khan
, Marten van Dijk
:
Advancing the State-of-the-Art in Hardware Trojans Detection. 18-32 - Erman Ayday

, Qiang Tang
, Arif Yilmaz:
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data. 33-43 - Xiaoguang Wang

, Yong Qi, Zhi Wang, Yue Chen, Yajin Zhou:
Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems. 44-57 - Aaron S. Pope

, Daniel R. Tauritz
, Alexander D. Kent:
Evolving Bipartite Authentication Graph Partitions. 58-71 - Yannan Li

, Yong Yu
, Geyong Min
, Willy Susilo
, Jianbing Ni, Kim-Kwang Raymond Choo
:
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems. 72-83 - Nathalie Baracaldo

, Balaji Palanisamy, James Joshi:
G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework. 84-98 - Tobias Wüchner

, Aleksander Cislak, Martín Ochoa
, Alexander Pretschner:
Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection. 99-112 - Yingyuan Yang

, Jinyuan Sun, Linke Guo
:
PersonaIA: A Lightweight Implicit Authentication System Based on Customized User Behavior Selection. 113-126 - Yongwang Zhao

, David Sanán
, Fuyuan Zhang, Yang Liu
:
Refinement-Based Specification and Security Analysis of Separation Kernels. 127-141 - Tianbo Wang, Chunhe Xia, Sheng Wen, Hui Xue, Yang Xiang

, Shouzhong Tu:
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks. 142-155 - Chenglu Jin

, Marten van Dijk
:
Secure and Efficient Initialization and Authentication Protocols for SHIELD. 156-173 - Muffy Calder

, Michele Sevegnani
:
Stochastic Model Checking for Predicting Component Failures and Service Availability. 174-187
Volume 16, Number 2, March - April 2019
- Dimitris Mitropoulos

, Panos Louridas, Michalis Polychronakis
, Angelos Dennis Keromytis:
Defending Against Web Application Attacks: Approaches, Challenges and Implications. 188-203 - Ling Ren

, Christopher W. Fletcher, Albert Kwon, Marten van Dijk
, Srinivas Devadas:
Design and Implementation of the Ascend Secure Processor. 204-216 - Martine De Cock

, Rafael Dowsley
, Caleb Horst, Raj S. Katti, Anderson C. A. Nascimento
, Wing-Sea Poon, Stacey Truex:
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation. 217-230 - Luis Munoz-Gonzalez

, Daniele Sgandurra, Martín Barrère
, Emil C. Lupu:
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs. 231-244 - Boyang Wang

, Ming Li
, Li Xiong
:
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data. 245-258 - Dong Xiang

, Bing Li, Yi Fu:
Fault-Tolerant Adaptive Routing in Dragonfly Networks. 259-271 - Xiao Lan

, Jing Xu, Zhenfeng Zhang, Wen-Tao Zhu:
Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3. 272-286 - Hojoon Lee

, Hyungon Moon, Ingoo Heo, DaeHee Jang, Jinsoo Jang
, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang:
KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object. 287-300 - Gregory Levitin

, Liudong Xing
, Yuanshun Dai:
Optimal Spot-Checking for Collusion Tolerance in Computer Grids. 301-312 - Gergely Ács

, Mauro Conti
, Paolo Gasti
, Cesar Ghali
, Gene Tsudik, Christopher A. Wood
:
Privacy-Aware Caching in Information-Centric Networking. 313-328 - Emre Yilmaz

, Hakan Ferhatosmanoglu
, Erman Ayday
, Remzi Can Aksoy:
Privacy-Preserving Aggregate Queries for Optimal Location Selection. 329-343 - Xiaofeng Ding

, Peng Liu
, Hai Jin
:
Privacy-Preserving Multi-Keyword Top-$k$ k Similarity Search Over Encrypted Data. 344-357 - Ranjan Pal

, Leana Golubchik, Konstantinos Psounis
, Pan Hui
:
Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets. 358-372
Volume 16, Number 3, May - June 2019
- Chip-Hong Chang

, Marten van Dijk
, Ulrich Rührmair, Mark Tehranipoor:
Emerging Attacks and Solutions for Secure Hardware in the Internet of Things. 373-375 - Ali Akbar Pammu

, Kwen-Siong Chong
, Yi Wang
, Bah-Hwee Gwee
:
A Highly Efficient Side Channel Attack with Profiling through Relevance-Learning on Physical Leakage Information. 376-387 - Bilgiday Yuce

, Chinmay Deshpande, Marjan Ghodrati, Abhishek Bendre
, Leyla Nazhandali, Patrick Schaumont
:
A Secure Exception Mode for Fault-Attack-Resistant Processing. 388-401 - Qian Wang

, Gang Qu
:
A Silicon PUF Based Entropy Pump. 402-414 - Pieter Maene

, Johannes Götzfried, Tilo Müller, Ruan de Clercq, Felix C. Freiling
, Ingrid Verbauwhede
:
Atlas: Application Confidentiality in Compromised Embedded Systems. 415-423 - Urbi Chatterjee

, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
, Debashis Mahata
, Mukesh M. Prabhu
:
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database. 424-437 - Le Guan

, Chen Cao, Peng Liu
, Xinyu Xing, Xinyang Ge, Shengzhi Zhang
, Meng Yu, Trent Jaeger:
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. 438-453 - Wei Li

, Linfeng Liao, Dawu Gu, Chaoyun Li
, Chenyu Ge, Zheng Guo, Ya Liu, Zhiqiang Liu
:
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things. 454-461 - André Schaller, Wenjie Xiong

, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Boris Skoric
, Stefan Katzenbeisser, Jakub Szefer
:
Decay-Based DRAM PUFs in Commodity Devices. 462-475 - Huiyun Li

, Cuiping Shao
, Zheng Wang
:
Detecting Fault Injection Attacks Based on Compressed Sensing and Integer Linear Programming. 476-483 - Yiran Shen

, Hongkai Wen, Chengwen Luo
, Weitao Xu
, Tao Zhang
, Wen Hu
, Daniela Rus:
GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait. 484-497 - Marc Fyrbiak

, Sebastian Wallat, Pawel Swierczynski
, Max Hoffmann
, Sebastian Hoppach
, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar
:
HAL - The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion. 498-510 - Hila Rabii, Yaara Neumeier

, Osnat Keren
:
High Rate Robust Codes with Low Implementation Complexity. 511-520 - Zhe Liu

, Hwajeong Seo, Aniello Castiglione
, Kim-Kwang Raymond Choo
, Howon Kim:
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things. 521-529 - S. Abhishek Anand

, Nitesh Saxena:
Noisy Vibrational Pairing of IoT Devices. 530-545
Volume 16, Number 4, July - August 2019
- Vasileios Karyotis

:
A Markov Random Field Framework for Modeling Malware Propagation in Complex Communications Networks. 551-564 - Jonathan Chase

, Dusit Niyato
, Ping Wang
, Sivadon Chaisiri, Ryan K. L. Ko
:
A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing. 565-579 - Yuichi Sei

, Hiroshi Okumura, Takao Takenouchi, Akihiko Ohsuga:
Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness. 580-593 - Shouling Ji

, Ting Wang, Jianhai Chen, Weiqing Li, Prateek Mittal, Raheem Beyah
:
De-SAG: On the De-Anonymization of Structure-Attribute Graph Data. 594-607 - Aydin Abadi

, Sotirios Terzis
, Roberto Metere
, Changyu Dong
:
Efficient Delegated Private Set Intersection on Outsourced Private Datasets. 608-624 - Rui Zhang, Yuting Xiao

, Shuzhou Sun, Hui Ma
:
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications. 625-634 - Guido Lena Cota

, Sonia Ben Mokhtar
, Gabriele Gianini, Ernesto Damiani, Julia Lawall, Gilles Muller, Lionel Brunie:
RACOON++: A Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems. 635-650 - Hamed Farbeh

, Fereshte Mozafari, Masoume Zabihi, Seyed Ghassem Miremadi
:
RAW-Tag: Replicating in Altered Cache Ways for Correcting Multiple-Bit Errors in Tag Array. 651-664 - Chongxi Bao

, Ankur Srivastava
:
Reducing Timing Side-Channel Information Leakage Using 3D Integration. 665-678 - Jianwei Qian

, Xiang-Yang Li
, Chunhong Zhang, Linlin Chen, Taeho Jung, Junze Han
:
Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model. 679-692 - Cai Fu

, Xiao-Yang Liu
, Jia Yang, Laurence T. Yang
, Shui Yu
, Tianqing Zhu
:
Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks. 693-710 - Ambra Demontis

, Marco Melis
, Battista Biggio
, Davide Maiorca
, Daniel Arp, Konrad Rieck, Igino Corona
, Giorgio Giacinto
, Fabio Roli
:
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection. 711-724 - Fang-Yu Rao

:
On the Security of a Variant of ElGamal Encryption Scheme. 725-728
Volume 16, Number 5, September - October 2019
- Raphael C.-W. Phan, Moti Yung:

Paradigm Shifts in Cryptographic Engineering. 729-730 - Russell W. F. Lai

, Kam-Fung Cheung
, Sherman S. M. Chow
, Anthony Man-Cho So
:
Another Look at Anonymous Communication. 731-742 - Myungsun Kim

, Hyung Tae Lee
, San Ling
, Benjamin Hong Meng Tan
, Huaxiong Wang:
Private Compound Wildcard Queries Using Fully Homomorphic Encryption. 743-756 - Akshima, Donghoon Chang, Aarushi Goel, Sweta Mishra

, Somitra Kumar Sanadhya
:
Generation of Secure and Reliable Honeywords, Preventing False Detection. 757-769 - Maliheh Shirvanian

, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
Building and Studying a Password Store that Perfectly Hides Passwords from Itself. 770-782 - Georg T. Becker

:
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory versus Practice. 783-795 - Margarita Osadchy

, Orr Dunkelman
:
It is All in the System's Parameters: Privacy and Security Issues in Transforming Biometric Raw Data into Binary Strings. 796-804 - Pawel Lorek

, Filip Zagórski
, Michal Kulis:
Strong Stationary Times and its use in Cryptography. 805-818 - Muhammad Umer Arshad

, Muhamad Felemban
, Zahid Pervaiz
, Arif Ghafoor
, Walid G. Aref
:
A Privacy Mechanism for Access Controlled Graph Data. 819-832 - Zhenfu Cao, Hongbing Wang

, Yunlei Zhao:
AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications. 833-842 - Liwei Zhang, A. Adam Ding

, Yunsi Fei
, Pei Luo
:
Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points. 843-855 - Domenico Cotroneo

, Andrea Paudice
, Antonio Pecchia
:
Empirical Analysis and Validation of Security Alerts Filtering Techniques. 856-870 - Mohamed Mahmoud

, Khaled Rabieh, Ahmed B. T. Sherif, Enahoro Oriero, Muhammad Ismail
, Erchin Serpedin
, Khalid A. Qaraqe
:
Privacy-Preserving Fine-Grained Data Retrieval Schemes for Mobile Social Networks. 871-884 - Mahmoud Ammar

, Bruno Crispo
, Bart Jacobs
, Danny Hughes, Wilfried Daniels:
SμV - The Security MicroVisor: A Formally-Verified Software-Based Security Architecture for the Internet of Things. 885-901 - Amir Jalali

, Reza Azarderakhsh
, Mehran Mozaffari Kermani
, David Jao
:
Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM. 902-912
Volume 16, Number 6, November - December 2019
- Gail-Joon Ahn

, Guofei Gu, Hongxin Hu
, Seungwon Shin
:
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies. 913-914 - Qi Li

, Xiaoyue Zou
, Qun Huang
, Jing Zheng
, Patrick P. C. Lee
:
Dynamic Packet Forwarding Verification in SDN. 915-929 - Qingjun Chen

, Shouqian Shi, Xin Li
, Chen Qian, Sheng Zhong:
SDN-Based Privacy Preserving Cross Domain Routing. 930-943 - Juan Wang

, Ru Wen
, Jiangqi Li, Fei Yan
, Bo Zhao, Fajiang Yu:
Detecting and Mitigating Target Link-Flooding Attacks Using SDN. 944-956 - Wiem Abderrahim

, Zièd Choukair:
Dependability Integration in Cloud-hosted Telecommunication Services. 957-968 - Anca Jurcut

, Tom Coffey, Reiner Dojen
:
A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks. 969-983 - Sancheng Peng, Guojun Wang, Yongmei Zhou, Cong Wan, Cong Wang, Shui Yu, Jianwei Niu:

An Immunization Framework for Social Networks Through Big Data Based Influence Modeling. 984-995 - Jian Shen

, Tianqi Zhou
, Debiao He
, Yuexin Zhang, Xingming Sun, Yang Xiang
:
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing. 996-1010 - Sandeep Pisharody

, Janakarajan Natarajan, Ankur Chowdhary
, Abdullah Alshalan
, Dijiang Huang
:
Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments. 1011-1025 - Xiaojing Liao

, Preethi Srinivasan, David Formby
, Raheem A. Beyah
:
Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid. 1026-1039 - Song Gao, Manar Mohamed

, Nitesh Saxena, Chengcui Zhang:
Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures. 1040-1053 - Xiao Han

, Hailiang Huang
, Leye Wang
:
F-PAD: Private Attribute Disclosure Risk Estimation in Online Social Networks. 1054-1069 - Giorgos Kappes

, Andromachi Hatzieleftheriou, Stergios V. Anastasiadis
:
Multitenant Access Control for Cloud-Aware Distributed Filesystems. 1070-1085 - Limei Lin

, Li Xu
, Riqing Chen
, Sun-Yuan Hsieh
, Dajin Wang:
Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks. 1086-1097

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














