


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 17
Volume 17, Number 1, January - February 2020
- Jaideep Vaidya

:
Editorial. 1 - Andrea De Salve

, Roberto Di Pietro
, Paolo Mori
, Laura Ricci
:
A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks. 2-21 - Eyal Itkin, Avishai Wool

:
A Security Analysis and Revised Security Extension for the Precision Time Protocol. 22-34 - Jeroen Van Cleemput

, Bjorn De Sutter
, Koen De Bosschere:
Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks. 35-49 - Wenyuan Xu

, Jing Tian
, Yu Cao, Song Wang
:
Challenge-Response Authentication Using In-Air Handwriting Style Verification. 51-64 - Ke Tian

, Danfeng Yao
, Barbara G. Ryder
, Gang Tan
, Guojun Peng:
Detection of Repackaged Android Malware with Code-Heterogeneity Features. 64-77 - Yang Yang

, Ximeng Liu
, Robert H. Deng
, Yingjiu Li
:
Lightweight Sharable and Traceable Secure Mobile Health System. 78-91 - Zheng Zheng

, Kishor S. Trivedi
, Nan Wang, Kun Qiu
:
Markov Regenerative Models of WebServers for Their User-Perceived Availability and Bottlenecks. 92-105 - Yanjun Pan

, Yantian Hou
, Ming Li
, Ryan M. Gerdes, Kai Zeng
, Md. Asaduzzaman Towfiq
, Bedri A. Cetiner
:
Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization. 106-120 - Yifeng Zheng

, Huayi Duan
, Xingliang Yuan
, Cong Wang
:
Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery. 121-133 - Pilar Holgado

, Víctor A. Villagrá
, Luis Vázquez:
Real-Time Multistep Attack Prediction Based on Hidden Markov Models. 134-147 - Suhrid Satyal

, Ingo Weber
, Len Bass, Min Fu:
Rollback Mechanisms for Cloud Management APIs Using AI Planning. 148-161 - Yuan Zhang

, Boyu Zhu, Yixin Fang, Suxin Guo, Aidong Zhang
, Sheng Zhong:
Secure Inter-Domain Forwarding Loop Test in Software Defined Networks. 162-178 - Linzhi Jiang

, Chunxiang Xu, Xiaofang Wang, Bo Luo
, Huaqun Wang:
Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain. 179-193 - Ali Inan

, Mehmet Emre Gursoy
, Yücel Saygin
:
Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms. 194-207 - Wei You

, Bin Liang
, Wenchang Shi
, Peng Wang, Xiangyu Zhang:
TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices. 209-222
Volume 17, Number 2, March - April 2020
- Boxiang Dong

, Hui Wang, Anna Monreale
, Dino Pedreschi
, Fosca Giannotti, Wenge Guo:
Authenticated Outlier Mining for Outsourced Databases. 222-235 - Zhikun Zhang

, Heng Zhang
, Shibo He
, Peng Cheng
:
Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks. 236-247 - Zhirong Shen

, Patrick P. C. Lee
, Jiwu Shu, Wenzhong Guo
:
Cross-Rack-Aware Single Failure Recovery for Clustered File Systems. 248-261 - Tanmoy Chakraborty

, Fabio Pierazzi
, V. S. Subrahmanian:
EC2: Ensemble Clustering and Classification for Predicting Android Malware Families. 262-277 - Andreas Walz

, Axel Sikora
:
Exploiting Dissent: Towards Fuzzing-Based Differential Black-Box Testing of TLS Implementations. 278-291 - Keita Emura

, Takuya Hayashi
, Ai Ishida:
Group Signatures with Time-Bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation. 292-305 - Li Lu

, Lingshuang Liu, Muhammad Jawad Hussain
, Yongshuai Liu
:
I Sense You by Breath: Speaker Recognition via Breath Biometrics. 306-319 - Yang Yang

, Ximeng Liu
, Robert H. Deng
:
Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language. 320-334 - Chao Shen

, Yufei Chen
, Xiaohong Guan, Roy A. Maxion:
Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System. 335-349 - Huaxin Li

, Qingrong Chen
, Haojin Zhu
, Di Ma
, Hong Wen
, Xuemin Sherman Shen
:
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks. 350-362 - Wenxiu Ding

, Zheng Yan
, Robert H. Deng
:
Privacy-Preserving Data Processing with Flexible Access Control. 363-376 - Luigi Catuogno

, Clemente Galdi
, Giuseppe Persiano
:
Secure Dependency Enforcement in Package Management Systems. 377-390 - Mohammad Wazid

, Ashok Kumar Das
, Vanga Odelu
, Neeraj Kumar
, Willy Susilo
:
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. 391-406 - Weili Han

, Chang Cao
, Hao Chen
, Dong Li
, Zheran Fang, Wenyuan Xu, X. Sean Wang:
senDroid: Auditing Sensor Access in Android System-Wide. 407-421 - Nahid Juma

, Jonathan Shahen
, Khalid Zaman Bijon
, Mahesh Tripunitara
:
The Overhead from Combating Side-Channels in Cloud Systems Using VM-Scheduling. 422-435 - Tara Merin John

, Syed Kamran Haider
, Hamza Omar
, Marten van Dijk
:
Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory. 436-442 - Emre Kaplan

, Mehmet Emre Gursoy
, Mehmet Ercan Nergiz
, Yücel Saygin
:
Known Sample Attacks on Relation Preserving Data Transformations. 443-450
Volume 17, Number 3, May - June 2020
- Mohammad Ashiqur Rahman

, Amarjit Datta
:
Impact of Stealthy Attacks on Optimal Power Flow: A Simulink-Driven Formal Analysis. 451-464 - P. V. Rajkumar

, Ravi S. Sandhu:
Safety Decidability for Pre-Authorization Usage Control with Identifier Attribute Domains. 465-478 - Xiaonan Zhu, Jinku Li

, Yajin Zhou, Jianfeng Ma:
AdCapsule: Practical Confinement of Advertisements in Android Applications. 479-492 - Igor Kaitovic

, Miroslaw Malek
:
Impact of Failure Prediction on Availability: Modeling and Comparative Analysis of Predictive and Reactive Methods. 493-505 - Masoud Narouei

, Hassan Takabi, Rodney Nielsen:
Automatic Extraction of Access Control Policies from Natural Language Documents. 506-517 - Peter F. Klemperer

, Hye Yoon Jeon, Bryan D. Payne, James C. Hoe
:
High-Performance Memory Snapshotting for Real-Time, Consistent, Hypervisor-Based Monitors. 518-535 - Zhe Liu, Patrick Longa

, Geovandro C. C. F. Pereira
, Oscar Reparaz
, Hwajeong Seo
:
Four$\mathbb {Q}$Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks. 536-549 - Neetesh Saxena

, Hong Shen, Nikos Komninos
, Kim-Kwang Raymond Choo
, Narendra S. Chaudhari:
BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users. 550-565 - Christian Esposito

, Massimo Ficco
, Aniello Castiglione
, Francesco Palmieri
, Alfredo De Santis
:
Distributed Group Key Management for Event Notification Confidentiality Among Sensors. 566-580 - Jianbing Ni

, Kuan Zhang
, Yong Yu
, Xiaodong Lin
, Xuemin Sherman Shen
:
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing. 581-594 - Yonggang Huang

, Jun Zhang
, Lei Pan
, Yang Xiang
:
Privacy Protection in Interactive Content Based Image Retrieval. 595-607 - Yue Zhang

, Jia Yu
, Rong Hao
, Cong Wang
, Kui Ren:
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data. 608-619 - Khaled N. Khasawneh

, Meltem Ozsoy, Caleb Donovick
, Nael B. Abu-Ghazaleh
, Dmitry Ponomarev:
EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers. 620-633 - Lei Zhang

, Xinyu Meng, Kim-Kwang Raymond Choo
, Yuanfei Zhang, Feifei Dai:
Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud. 634-647 - An Wang, Wentao Chang

, Songqing Chen
, Aziz Mohaisen
:
A Data-Driven Study of DDoS Attacks and Their Dynamics. 648-661 - Antonio Montieri

, Domenico Ciuonzo
, Giuseppe Aceto
, Antonio Pescapè
:
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web). 662-675
Volume 17, Number 4, July - August 2020
- Xiaohui Liang

, Ronald A. Peterson, David Kotz
:
Securely Connecting Wearables to Ambient Displays with User Intent. 676-690 - Sai Mounika Errapotu

, Hongning Li
, Rong Yu
, Shaolei Ren
, Qingqi Pei
, Miao Pan
, Zhu Han
:
Clock Auction Inspired Privacy Preserving Emergency Demand Response in Colocation Data Centers. 691-702 - Liehuang Zhu

, Meng Li
, Zijian Zhang
, Zhan Qin
:
ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks. 703-715 - Hong Zhao

, Luke Kwiat, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection. 716-729 - Muhammad Shahzad

, M. Zubair Shafiq, Alex X. Liu
:
Large Scale Characterization of Software Vulnerability Life Cycles. 730-744 - Aziz Mohaisen

, Zhongshu Gu
, Kui Ren, Zhenhua Li
, Charles A. Kamhoua, Laurent L. Njilla, DaeHun Nyang
:
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation. 745-759 - Yan Zhang, Loukas Lazos

:
Misbehavior in Multi-Channel MAC Protocols. 760-774 - Andrea Visconti

, Federico Gorla
:
Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2. 775-781 - Jing Li

, Peng Li, Rebecca J. Stones
, Gang Wang
, Zhongwei Li, Xiaoguang Liu
:
Reliability Equations for Cloud Storage Systems with Proactive Fault Tolerance. 782-794 - Xiaobo Ma

, Bo An, Mengchen Zhao, Xiapu Luo
, Lei Xue
, Zhenhua Li
, Tony T. N. Miu, Xiaohong Guan:
Randomized Security Patrolling for Link Flooding Attack Detection. 795-812 - Arslan Munir

, Farinaz Koushanfar
:
Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study. 813-827 - Sheng Li

, Xinpeng Zhang
, Zhenxing Qian
, Guorui Feng
, Yanli Ren
:
Key Based Artificial Fingerprint Generation for Privacy Protection. 828-840 - Bert Abrath

, Bart Coppens
, Mohit Mishra
, Jens Van den Broeck
, Bjorn De Sutter
:
$\Delta$ΔBreakpad: Diversified Binary Crash Reporting. 841-856 - Jun Feng

, Laurence T. Yang
, Qing Zhu, Kim-Kwang Raymond Choo
:
Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment. 857-868 - Zishan Liu

, Zhenyu Liu
, Lin Zhang
, Xiaodong Lin
:
MARP: A Distributed MAC Layer Attack Resistant Pseudonym Scheme for VANET. 869-882 - Sungjin Park

, Chung Hwan Kim
, Junghwan Rhee, Jong-Jin Won, Taisook Han
, Dongyan Xu:
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality. 883-897
Volume 17, Number 5, September - October 2020
- Ximeng Liu

, Robert H. Deng
, Kim-Kwang Raymond Choo
, Yang Yang
, HweeHwa Pang
:
Privacy-Preserving Outsourced Calculation Toolkit in the Cloud. 898-911 - Xiangfu Song

, Changyu Dong
, Dandan Yuan, Qiuliang Xu
, Minghao Zhao:
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. 912-927 - Javier Álvarez Cid-Fuentes

, Claudia Szabo
, Katrina Falkner:
Adaptive Performance Anomaly Detection in Distributed Systems Using Online SVMs. 928-941 - Jangirala Srinivas

, Ashok Kumar Das
, Neeraj Kumar
, Joel J. P. C. Rodrigues
:
Cloud Centric Authentication for Wearable Healthcare Monitoring System. 942-956 - Dina Kamel

, François-Xavier Standaert
, Alexandre Duc, Denis Flandre
, Francesco Berti
:
Learning with Physical Noise or Errors. 957-971 - Ziyuan Hu

, Shengli Liu, Kefei Chen
:
Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks. 972-983 - Shujie Cui

, Muhammad Rizwan Asghar
, Giovanni Russello:
Multi-CDN: Towards Privacy in Content Delivery Networks. 984-999 - Jinsoo Jang

, Brent ByungHoon Kang
:
Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection. 1000-1014 - Mikhail Dorojevets

:
Energy-Efficient Superconductor Bloom Filters for Streaming Data Inspection. 1015-1025 - Hui Ma

, Rui Zhang
, Guomin Yang
, Zishuai Song, Kai He, Yuting Xiao
:
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices. 1026-1038 - Rachid Guerraoui

, Alexandre Maurer
:
The Cost of Scaling a Reliable Interconnection Topology. 1039-1050 - Jianan Hong, Kaiping Xue

, Na Gai, David S. L. Wei
, Peilin Hong
:
Service Outsourcing in F2C Architecture with Attribute-based Anonymous Access Control and Bounded Service Number. 1051-1062 - Wei Song

, Qingqing Huang, Jeff Huang:
Understanding JavaScript Vulnerabilities in Large Real-World Android Applications. 1063-1078 - Dajiang Chen

, Ning Zhang
, Nan Cheng
, Kuan Zhang
, Zhiguang Qin
, Xuemin Shen
:
Physical Layer based Message Authentication with Secure Channel Codes. 1079-1093 - Zeyu Mi

, Haibo Chen
, Yinqian Zhang, ShuangHe Peng, Xiaofeng Wang, Michael K. Reiter
:
CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. 1094-1108 - Lu Ou

, Zheng Qin
, Shaolin Liao
, Yuan Hong
, Xiaohua Jia
:
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy. 1109-1123 - Debiao He

, Yudi Zhang
, Ding Wang
, Kim-Kwang Raymond Choo
:
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. 1124-1132
Volume 17, Number 6, November - December 2020
- Jangirala Srinivas

, Ashok Kumar Das
, Mohammad Wazid
, Neeraj Kumar
:
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things. 1133-1146 - Jose Ignacio Aizpurua

, Yiannis Papadopoulos
, Guillaume Merle:
Explicit Modelling and Treatment of Repair in Prediction of Dependability. 1147-1162 - Lu-Xing Yang

, Pengdeng Li
, Xiaofan Yang
, Yuan Yan Tang:
A Risk Management Approach to Defending Against the Advanced Persistent Threat. 1163-1172 - Jiayi Chen

, Jianping He
, Lin Cai
, Jianping Pan
:
Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing. 1173-1187 - Liang Zhao

, Liqun Chen
:
Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited. 1188-1206 - Kai He, Jun Guo, Jian Weng

, Jiasi Weng
, Joseph K. Liu
, Xun Yi
:
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data. 1207-1217 - Leo Yu Zhang

, Yifeng Zheng
, Jian Weng
, Cong Wang
, Zihao Shan, Kui Ren:
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center. 1218-1231 - Rekha Govindaraj

, Swaroop Ghosh
, Srinivas Katkoori
:
Design, Analysis and Application of Embedded Resistive RAM Based Strong Arbiter PUF. 1232-1242 - Hui Xu

, Zirui Zhao, Yangfan Zhou, Michael R. Lyu:
Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs. 1243-1256 - Chin-Tser Huang

, Muhammad N. Sakib
, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising. 1257-1268 - Rouzbeh Behnia

, Muslum Ozgur Ozmen
, Attila Altay Yavuz
:
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives. 1269-1282 - Yulai Xie

, Dan Feng, Yuchong Hu
, Yan Li
, Staunton Sample, Darrell D. E. Long
:
Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments. 1283-1296 - Mihai Maruseac

, Gabriel Ghinita
:
Precision-Enhanced Differentially-Private Mining of High-Confidence Association Rules. 1297-1309 - Lin Yao

, Zhenzhen Fan
, Jing Deng
, Xin Fan
, Guowei Wu
:
Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks. 1310-1321 - Xueqiao Liu

, Guomin Yang
, Yi Mu
, Robert H. Deng
:
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage. 1322-1332 - Pierre Bergé

, Jason Crampton, Gregory Z. Gutin
, Rémi Watrigant:
The Authorization Policy Existence Problem. 1333-1344

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














