


Остановите войну!
for scientists:


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 19
Volume 19, Number 1, January - February 2022
- Ayyoob Hamza
, Dinesha Ranathunga
, Hassan Habibi Gharakheili
, Theophilus A. Benson
, Matthew Roughan
, Vijay Sivaraman
:
Verifying and Monitoring IoTs Network Behavior Using MUD Profiles. 1-18 - Zhou Su
, Yuntao Wang
, Qichao Xu
, Ning Zhang
:
LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue. 19-32 - Dan Brownstein
, Shlomi Dolev
, Muni Venkateswarlu Kumaramangalam
:
Self-Stabilizing Secure Computation. 33-38 - Mohamed Baza, Mahmoud Nabil, Mohamed M. E. A. Mahmoud, Niclas Bewermeier, Kemal Fidan, Waleed Alasmary, Mohamed Abdallah:
Detecting Sybil Attacks Using Proofs of Work and Location in VANETs. 39-53 - Gurjit Singh Walia
, Kartik Aggarwal
, Kuldeep Singh
, Kunwar Singh:
Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach. 54-66 - Jin Li
, Heng Ye
, Tong Li
, Wei Wang
, Wenjing Lou
, Y. Thomas Hou
, Jiqiang Liu
, Rongxing Lu
:
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators. 67-76 - Yao Cheng
, Chang Xu
, Zhen Hai
, Yingjiu Li
:
DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model. 77-90 - Rui Li
, Alex X. Liu
, Huanle Xu
, Ying Liu, Huaqiang Yuan:
Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data. 91-106 - Guillermo Suarez-Tangil
, Gianluca Stringhini:
Eight Years of Rider Measurement in the Android Malware Ecosystem. 107-118 - Yannan Li
, Willy Susilo
, Guomin Yang
, Yong Yu
, Dongxi Liu, Xiaojiang Du
, Mohsen Guizani
:
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. 119-130 - Qingyu Yang, Donghe Li, Dou An, Wei Yu
, Xinwen Fu
, Xinyu Yang, Wei Zhao
:
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids. 131-148 - Jinhua Ma
, Xinyi Huang
, Yi Mu
, Robert H. Deng
:
Authenticated Data Redaction With Accountability and Transparency. 149-160 - Mohamad Chehab
, Azzam Mourad
:
LP-SBA-XACML: Lightweight Semantics Based Scheme Enabling Intelligent Behavior-Aware Privacy for IoT. 161-175 - Sateesh Kumar Awasthi
, Yatindra Nath Singh
:
AbsoluteTrust: Algorithm for Aggregation of Trust in Peer-to-Peer Networks. 176-189 - Yanhua Du
, Yang Wang, Benyuan Yang
, Hesuan Hu
:
Analyzing Security Requirements in Timed Workflow Processes. 190-207 - Xing Gao
, Guannan Liu
, Zhang Xu, Haining Wang
, Li Li, Xiaorui Wang
:
Investigating Security Vulnerabilities in a Hot Data Center with Reduced Cooling Redundancy. 208-226 - Ahmad Samer Wazan
, Romain Laborde
, David W. Chadwick
, Rémi Venant, Abdelmalek Benzekri, Eddie Billoir
, Omar Alfandi
:
On the Validation of Web X.509 Certificates by TLS Interception Products. 227-242 - Lucas Palazzi
, Guanpeng Li
, Bo Fang, Karthik Pattabiraman
:
Improving the Accuracy of IR-Level Fault Injection. 243-258 - Yuchen Zhao
, Isabel Wagner
:
Using Metrics Suites to Improve the Measurement of Privacy in Graphs. 259-274 - Kyungmin Go
, Il-Gu Lee, Sungwon Kang
, Myungchul Kim
:
Secure Video Transmission Framework for Battery-Powered Video Devices. 275-287 - Fritz Previlon
, Charu Kalra, Devesh Tiwari, David R. Kaeli
:
Characterizing and Exploiting Soft Error Vulnerability Phase Behavior in GPU Applications. 288-300 - Cheng Wang
, Hangyu Zhu
:
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services. 301-315 - Dezhi Han
, Nannan Pan
, Kuan-Ching Li
:
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection. 316-327 - Cong Zuo
, Shifeng Sun
, Joseph K. Liu
, Jun Shao
, Josef Pieprzyk
, Lei Xu
:
Forward and Backward Private DSSE for Range Queries. 328-338 - Rajorshi Biswas
, Jie Wu
:
Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack. 339-352 - Ruimin Sun
, Marcus Botacin
, Nikolaos Sapountzis, Xiaoyong Yuan
, Matt Bishop
, Donald E. Porter, Xiaolin Li
, Andre Gregio
, Daniela Oliveira
:
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation. 353-369 - Yunqing Sun, Jin Cao
, Maode Ma
, Yinghui Zhang
, Hui Li
, Ben Niu
:
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet. 370-387 - Yanguo Peng
, Long Wang
, Jiangtao Cui
, Ximeng Liu
, Hui Li
, Jianfeng Ma:
LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data. 388-401 - Sadegh Torabi
, Elias Bou-Harb
, Chadi Assi
, ElMouatez Billah Karbab, Amine Boukhtouta, Mourad Debbabi
:
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope. 402-418 - Yansong Gao
, Marten van Dijk, Lei Xu
, Wei Yang
, Surya Nepal
, Damith C. Ranasinghe
:
TREVERSE: TRial-and-Error Lightweight Secure ReVERSE Authentication With Simulatable PUFs. 419-437 - Shigang Liu
, Guanjun Lin
, Lizhen Qu, Jun Zhang
, Olivier Y. de Vel, Paul Montague, Yang Xiang
:
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation. 438-451 - Shifeng Sun
, Cong Zuo
, Joseph K. Liu
, Amin Sakzad
, Ron Steinfeld, Tsz Hon Yuen
, Xingliang Yuan
, Dawu Gu
:
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. 452-467 - Lotfi Ben Othmane
, Lalitha Dhulipala, Moataz AbdelKhalek, Nicholas J. Multari
, Manimaran Govindarasu:
On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus. 468-481 - Dinesha Ranathunga
, Matthew Roughan
, Hung X. Nguyen
:
Verifiable Policy-Defined Networking Using Metagraphs. 482-494 - Felix Erlacher
, Falko Dressler
:
On High-Speed Flow-Based Intrusion Detection Using Snort-Compatible Signatures. 495-506 - Chenyu Wang, Ding Wang
, Yi Tu
, Guoai Xu
, Huaxiong Wang
:
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks. 507-523 - Naman Patel
, Prashanth Krishnamurthy
, Hussam Amrouch
, Jörg Henkel
, Michael Shamouilian
, Ramesh Karri
, Farshad Khorrami
:
Towards a New Thermal Monitoring Based Framework for Embedded CPS Device Security. 524-536 - Klaus-Tycho Foerster
, Andrzej Kamisinski
, Yvonne-Anne Pignolet
, Stefan Schmid
, Gilles Trédan:
Improved Fast Rerouting Using Postprocessing. 537-550 - Chunlin Xiong
, Tiantian Zhu
, Weihao Dong
, Linqi Ruan
, Runqing Yang
, Yueqiang Cheng
, Yan Chen, Shuai Cheng, Xutong Chen
:
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency. 551-565 - George Theodorakopoulos
, Emmanouil Panaousis
, Kaitai Liang
, George Loukas
:
On-the-Fly Privacy for Location Histograms. 566-578 - Ruiyu Zhu
, Yan Huang
:
Efficient and Precise Secure Generalized Edit Distance and Beyond. 579-590 - Xue Yang
, Rongxing Lu
, Jun Shao
, Xiaohu Tang
, Ali A. Ghorbani
:
Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud. 591-606 - Yi He, Yuan Zhou, Yajin Zhou, Qi Li, Kun Sun
, Yacong Gu, Yong Jiang:
JNI Global References Are Still Vulnerable: Attacks and Defenses. 607-619 - Yue Li
, Zeyu Chen, Haining Wang
, Kun Sun
, Sushil Jajodia
:
Understanding Account Recovery in the Wild and its Security Implications. 620-634 - Kaiping Xue
, Na Gai, Jianan Hong, David S. L. Wei, Peilin Hong
, Nenghai Yu
:
Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage. 635-646 - Yanxue Jia
, Shifeng Sun
, Yuncong Zhang
, Qingzhao Zhang, Ning Ding, Zhiqiang Liu
, Joseph K. Liu
, Dawu Gu
:
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions. 647-662 - Harishma Boyapally
, Paulson Mathew
, Sikhar Patranabis
, Urbi Chatterjee
, Umang Agarwal, Manu Maheshwari, Soumyajit Dey
, Debdeep Mukhopadhyay:
Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters. 663-680 - Ze Wang, Jingqiang Lin
, Quanwei Cai, Qiongxiao Wang, Daren Zha, Jiwu Jing:
Blockchain-Based Certificate Transparency and Revocation Transparency. 681-697 - Shabnam Kasra Kermanshahi
, Shifeng Sun
, Joseph K. Liu
, Ron Steinfeld, Surya Nepal
, Wang Fat Lau, Man Ho Allen Au
:
Geometric Range Search on Encrypted Data With Forward/Backward Security. 698-716
Volume 19, Number 2, March - April 2022
- Yunji Liang
, Qiushi Wang
, Kang Xiong, Xiaolong Zheng
, Zhiwen Yu
, Daniel Zeng:
Robust Detection of Malicious URLs With Self-Paced Wide & Deep Learning. 717-730 - Azqa Nadeem
, Sicco Verwer
, Stephen Moskal, Shanchieh Jay Yang:
Alert-Driven Attack Graph Generation Using S-PDFA. 731-746 - Rohit Valecha
, Pranali Mandaokar, H. Raghav Rao
:
Phishing Email Detection Using Persuasion Cues. 747-756 - Huiling Li
, Jun Wu
, Hansong Xu
, Gaolei Li
, Mohsen Guizani
:
Explainable Intelligence-Driven Defense Mechanism Against Advanced Persistent Threats: A Joint Edge Game and AI Approach. 757-775 - Yi-Ting Huang
, Chi Yu Lin
, Ying-Ren Guo
, Kai-Chieh Lo, Yeali S. Sun, Meng Chang Chen
:
Open Source Intelligence for Malicious Behavior Discovery and Interpretation. 776-789 - Yidong Chai
, Yonghang Zhou, Weifeng Li
, Yuanchun Jiang
:
An Explainable Multi-Modal Hierarchical Attention Model for Developing Phishing Threat Intelligence. 790-803 - Md Shihabul Islam
, Bo Dong, Swarup Chandra, Latifur Khan, Bhavani Thuraisingham:
GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game. 804-816 - Matheus E. Garbelini
, Chundong Wang
, Sudipta Chattopadhyay
:
Greyhound: Directed Greybox Wi-Fi Fuzzing. 817-834 - Osman Biçer, Muhammed Ali Bingöl
, Mehmet Sabir Kiraz
, Albert Levi
:
Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity. 835-847 - Eduardo Chielle
, Nektarios Georgios Tsoutsos
, Oleg Mazonka
, Michail Maniatakos
:
E3X: Encrypt-Everything-Everywhere ISA eXtensions for Private Computation. 848-861 - Guangquan Xu
, Xiaofei Xie
, Shuhan Huang
, Jun Zhang
, Lei Pan
, Wei Lou
, Kaitai Liang
:
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers. 862-878 - Zhihai Yang
, Qindong Sun, Yaling Zhang:
Probabilistic Inference and Trustworthiness Evaluation of Associative Links Toward Malicious Attack Detection for Online Recommendations. 879-896 - Xin Liao
, Jiaojiao Yin, Mingliang Chen
, Zheng Qin
:
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features. 897-911 - Xiaogang Zhu
, Xiaotao Feng, Xiaozhu Meng, Sheng Wen
, Seyit Camtepe
, Yang Xiang
, Kui Ren:
CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation. 912-923 - Vlad Craciun
, Pascal Felber
, Andrei Mogage
, Emanuel Onica
, Rafael Pires
:
Malware in the SGX Supply Chain: Be Careful When Signing Enclaves! 924-935 - Longxia Huang
, Junlong Zhou
, Gongxuan Zhang, Jin Sun
, Tongquan Wei
, Shui Yu
, Shiyan Hu
:
IPANM: Incentive Public Auditing Scheme for Non-Manager Groups in Clouds. 936-952 - Derui Wang
, Chaoran Li
, Sheng Wen
, Surya Nepal
, Yang Xiang
:
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training. 953-965 - Pedro Reviriego
, Jorge Martínez
, Ori Rottenstreich
, Shanshan Liu
, Fabrizio Lombardi
:
Remove Minimum (RM): An Error-Tolerant Scheme for Cardinality Estimate by HyperLogLog. 966-977 - Bing Chen, Wei Lu
, Jiwu Huang
, Jian Weng
, Yicong Zhou
:
Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders. 978-991 - Zhaoxia Yin
, Yinyin Peng
, Youzhi Xiang
:
Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Bit-Plane Compression. 992-1002 - Lingjuan Lyu
, Yitong Li
, Karthik Nandakumar
, Jiangshan Yu
, Xingjun Ma
:
How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning. 1003-1017 - Onur Duman
, Mengyuan Zhang, Lingyu Wang
, Mourad Debbabi
, Ribal F. Atallah, Bernard Lebel
:
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems. 1018-1035 - Jianting Ning
, Xinyi Huang
, Willy Susilo
, Kaitai Liang
, Ximeng Liu
, Yinghui Zhang
:
Dual Access Control for Cloud-Based Data Storage and Sharing. 1036-1048 - Mazen Al-Wadi, Kazi Abu Zubair, David Mohaisen
, Amro Awad
:
Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM. 1049-1063 - Shengmin Xu
, Jianting Ning
, Yingjiu Li
, Yinghui Zhang
, Guowen Xu
, Xinyi Huang
, Robert H. Deng
:
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. 1064-1077 - Shahram Khazaei, Mojtaba Rafiee
:
Towards More Secure Constructions of Adjustable Join Schemes. 1078-1089 - Yandong Zheng
, Rongxing Lu
, Yunguo Guan
, Jun Shao
, Hui Zhu
:
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data. 1090-1103 - Ning Xie
, Zhuoyuan Li, Jie Tan, Alex X. Liu
:
Detection of Information Hiding at Physical Layer in Wireless Communications. 1104-1117 - Lei Zhou, Anmin Fu
, Guomin Yang
, Huaqun Wang
, Yuqing Zhang
:
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics. 1118-1132 - Meng Li
, Yifei Chen
, Shuli Zheng, Donghui Hu
, Chhagan Lal
, Mauro Conti
:
Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks. 1133-1148 - Jiayun Xu
, Yingjiu Li
, Robert H. Deng
, Ke Xu
:
SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering. 1149-1163 - Jianting Ning
, Geong Sen Poh
, Xinyi Huang
, Robert H. Deng
, Shuwei Cao, Ee-Chien Chang:
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage. 1164-1180 - Yazdan Movahedi
, Michel Cukier
, Ilir Gashi
:
Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities. 1181-1193 - Harshan Jagadeesh
, Amogh Vithalkar, Naman Jhunjhunwala
, Manthan Kabra
, Prafull Manav
, Yih-Chun Hu
:
Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks. 1194-1211 - Dayong Ye
, Tianqing Zhu
, Sheng Shen, Wanlei Zhou
, Philip S. Yu
:
Differentially Private Multi-Agent Planning for Logistic-Like Problems. 1212-1226 - Dariush Abbasinezhad-Mood
, Sayyed Majid Mazinani
, Morteza Nikooghadam
, Arezou Ostad-Sharif
:
Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision. 1227-1238 - Fabrizio Cicala
, Elisa Bertino
:
Analysis of Encryption Key Generation in Modern Crypto Ransomware. 1239-1253 - Mandrita Banerjee, Carlo Borges, Kim-Kwang Raymond Choo
, Junghee Lee
, Chrysostomos Nicopoulos
:
A Hardware-Assisted Heartbeat Mechanism for Fault Identification in Large-Scale IoT Systems. 1254-1265 - Yang Liu
, Tong Feng, Mugen Peng
, Jianfeng Guan
, Yu Wang
:
DREAM: Online Control Mechanisms for Data Aggregation Error Minimization in Privacy-Preserving Crowdsensing. 1266-1279 - Jianye Huang
, Willy Susilo
, Fuchun Guo
, Ge Wu
, Zhen Zhao
, Qiong Huang
:
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*. 1280-1291 - Djamel Eddine Kouicem, Youcef Imine
, Abdelmadjid Bouabdallah, Hicham Lakhlef
:
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things. 1292-1306 - Bernardo Ferreira
, Bernardo Portela
, Tiago Oliveira
, Guilherme Borges, Henrique João L. Domingos
, João Leitão
:
Boolean Searchable Symmetric Encryption With Filters on Trusted Hardware. 1307-1319 - Haining Yang
, Ye Su
, Jing Qin
, Huaxiong Wang
:
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database. 1320-1337 - Shuming Qiu
, Ding Wang
, Guoai Xu
, Saru Kumari
:
Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices. 1338-1351 - Benyuan Yang
, Hesuan Hu
:
Dynamic Implementation of Security Requirements in Business Processes. 1352-1363 - Guowen Xu
, Hongwei Li
, Yun Zhang, Shengmin Xu, Jianting Ning
, Robert H. Deng
:
Privacy-Preserving Federated Deep Learning With Irregular Users. 1364-1381 - Zi-Long Liu
, Chi-Man Pun
:
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation. 1382-1394 - Wenlong Tian
, Ruixuan Li
, Zhiyong Xu, Weijun Xiao:
Loco-Store: Locality-Based Oblivious Data Storage. 1395-1406 - Maryam Zarezadeh, Hamid Mala
, Behrouz Tork Ladani
:
Efficient Secure Pattern Matching With Malicious Adversaries. 1407-1419 - Yang Du
, Zhaoxia Yin
, Xinpeng Zhang
:
High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping. 1420-1433
Volume 19, Number 3, May - June 2022
- Yanhai Xiong
, Giridhar Ramachandran, Rajesh Ganesan
, Sushil Jajodia
, V. S. Subrahmanian
:
Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft. 1434-1445 - Zhangshuang Guan
, Zhiguo Wan
, Yang Yang
, Yan Zhou, Butian Huang:
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs. 1446-1463 - Jian Shen
, Ziyuan Gui
, Xiaofeng Chen
, Jun Zhang
, Yang Xiang
:
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks. 1464-1475 - Domenico Cotroneo
, Luigi De Simone
, Pietro Liguori
, Roberto Natella
:
Fault Injection Analytics: A Novel Approach to Discover Failure Modes in Cloud-Computing Systems. 1476-1491 - Fengwei Wang
, Hui Zhu
, Rongxing Lu
, Yandong Zheng
, Hui Li
:
Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets. 1492-1504 - Saiyu Qi
, Yuanqing Zheng
, Xiaofeng Chen
, Wei Wei
:
Ants can Carry Cheese: Secure and Private RFID-Enabled Third-Party Distribution. 1505-1517 - Jia-Nan Liu
, Xizhao Luo
, Jian Weng
, Anjia Yang
, Xu An Wang
, Ming Li
, Xiaodong Lin
:
Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage. 1518-1531 - Hongbo Li
, Qiong Huang
, Willy Susilo
:
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search. 1532-1543 - Shuitao Gan
, Chao Zhang
, Xiaojun Qin, Xuwen Tu, Kang Li
, Zhongyu Pei, Zuoning Chen:
Path Sensitive Fuzzing for Native Applications. 1544-1561 - Mingfu Xue
, Can He
, Jian Wang, Weiqiang Liu
:
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models. 1562-1578 - Zheli Liu
, Siyi Lv, Jin Li
, Yanyu Huang
, Liang Guo
, Yali Yuan, Changyu Dong
:
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption. 1579-1591 - Minghui Li
, Sherman S. M. Chow
, Shengshan Hu
, Yuejing Yan, Chao Shen, Qian Wang
:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. 1592-1604 - Christian Berger
, Hans P. Reiser
, João Sousa, Alysson Bessani
:
AWARE: Adaptive Wide-Area Replication for Fast and Resilient Byzantine Consensus. 1605-1620 - Runqing Yang
, Xutong Chen
, Haitao Xu
, Yueqiang Cheng
, Chunlin Xiong
, Linqi Ruan
, Mohammad Kavousi, Zhenyuan Li
, Liheng Xu, Yan Chen
:
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows. 1621-1638 - Qiang Wang
, Fucai Zhou
, Boyang Zhou
, Jian Xu
, Chunyu Chen, Qi Wang:
Privacy-Preserving Publicly Verifiable Databases. 1639-1654