


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 8
Volume 8, Number 1, January - February 2011
- Beat Gfeller, Nicola Santoro

, Peter Widmayer:
A Distributed Algorithm for Finding All Best Swap Edges of a Minimum-Diameter Spanning Tree. 1-12 - Claudio A. Ardagna

, Marco Cremonini
, Sabrina De Capitani di Vimercati
, Pierangela Samarati
:
An Obfuscation-Based Approach for Protecting Location Privacy. 13-27 - Xiaohu Li

, Timothy Paul Parker, Shouhuai Xu:
A Stochastic Model for Quantitative Security Analyses of Networked Systems. 28-43 - Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer:

Automated Derivation of Application-Aware Error Detectors Using Static Analysis: The Trusted Illiac Approach. 44-57 - Bezawada Bruhadeshwar

, Sandeep S. Kulkarni:
Balancing Revocation and Storage Trade-Offs in Secure Group Communication. 58-73 - Dong Xiang:

Deadlock-Free Adaptive Routing in Meshes with Fault-Tolerance Ability Based on Channel Overlapping. 74-88 - Noman Mohammed, Hadi Otrok

, Lingyu Wang, Mourad Debbabi
, Prabir Bhattacharya:
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET. 89-103 - Paolo Romano

, Francesco Quaglia:
Providing e-Transaction Guarantees in Asynchronous Systems with No Assumptions on the Accuracy of Failure Detection. 104-121 - Henrique Moniz

, Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
:
RITAS: Services for Randomized Intrusion Tolerance. 122-136 - Feng Wang, Yuan Xie:

Soft Error Rate Analysis for Combinational Logic Using an Accurate Electrical Masking Model. 137-146 - Dmitry Rovniagin, Avishai Wool

:
The Geometric Efficient Matching Algorithm for Firewalls. 147-159
Volume 8, Number 2, March - April 2011
- Ing-Ray Chen, Anh Phan Speer, Mohamed Eltoweissy:

Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks. 161-176 - Marco Serafini, Péter Bokor, Neeraj Suri

, Jonny Vinter
, Astrit Ademaj, Wolfgang Brandstätter, Fulvio Tagliabo, Jens Koch:
Application-Level Diagnostic and Membership Protocols for Generic Time-Triggered Systems. 177-193 - Dennis Heimbigner:

A Tamper-Resistant Programming Language System. 194-206 - Jacques Henri Collet, Piotr Zajac

, Mihalis Psarakis, Dimitris Gizopoulos:
Chip Self-Organization and Fault Tolerance in Massively Defective Multicore Arrays. 207-217 - Jelena Mirkovic, Ezra Kissel:

Comparative Evaluation of Spoofing Defenses. 218-232 - John Felix Charles Joseph, Bu-Sung Lee

, Amitabha Das, Boon-Chong Seet:
Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA. 233-245 - Sun-Yuan Hsieh, Chia-Wei Lee

:
Diagnosability of Two-Matching Composition Networks under the MMast Model. 246-255 - Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sean W. Smith:

Nymble: Blocking Misbehaving Users in Anonymizing Networks. 256-269 - Sascha Grau, Mathias Fischer, Michael Brinkmeier, Günter Schäfer:

On Complexity and Approximability of Optimal DoS Attacks on Multiple-Tree P2P Streaming Topologies. 270-281 - Alexander Hofmann, Bernhard Sick

:
Online Intrusion Alert Aggregation with Generative Data Stream Modeling. 282-294 - Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fang

:
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks. 295-307 - Marta Portela-García

, Celia López-Ongil
, Mario García-Valderas
, Luis Entrena
:
Fault Injection in Modern Microprocessors Using On-Chip Debugging Infrastructures. 308-314 - Hung-Min Sun, Wei-Chih Ting, King-Hang Wang

:
On the Security of Chien's Ultralightweight RFID Authentication Protocol. 315-317
Volume 8, Number 3, May - June 2011
- Gang Xu, Cristian Borcea, Liviu Iftode:

A Policy Enforcing Mechanism for Trusted Ad Hoc Networks. 321-336 - Jianneng Cao, Barbara Carminati

, Elena Ferrari
, Kian-Lee Tan
:
CASTLE: Continuously Anonymizing Data Streams. 337-352 - Chia-Wei Lee

, Sun-Yuan Hsieh:
Determining the Diagnosability of (1, 2)-Matching Composition Networks and Its Applications. 353-362 - Kealan McCusker, Noel E. O'Connor

:
Low-Energy Symmetric Key Distribution in Wireless Sensor Networks. 363-376 - Wei Yu

, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao
:
Modeling and Detection of Camouflaging Worm. 377-390 - Refik Samet

:
Recovery Device for Real-Time Dual-Redundant Computer Systems. 391-403 - K. K. Rao, James Lee Hafner, Richard A. Golding:

Reliability for Networked Storage Nodes. 404-418 - Cyrus Harvesf, Douglas M. Blough:

Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables. 419-433 - Xinyuan Wang, Douglas S. Reeves:

Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking. 434-449 - Andrea Gabrielli, Luigi V. Mancini

, Sanjeev Setia, Sushil Jajodia
:
Securing Topology Maintenance Protocols for Sensor Networks. 450-465 - Erik-Oliver Blass, Anil Kurmus, Refik Molva

, Guevara Noubir, Abdullatif Shikfa
:
The F_f-Family of Protocols for RFID-Privacy and Authentication. 466-480
Volume 8, Number 4, July - August 2011
- Ge-Ming Chiu, Jane-Ferng Chiu:

A New Diskless Checkpointing Approach for Multiple Processor Failures. 481-493 - Federico Simmross-Wattenberg

, Juan I. Asensio-Pérez
, Pablo Casaseca-de-la-Higuera
, Marcos Martín-Fernández
, Ioannis A. Dimitriadis
, Carlos Alberola-López
:
Anomaly Detection in Network Traffic Based on Statistical Inference and alpha-Stable Modeling. 494-509 - Miao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward:

Efficient Fault Detection and Diagnosis in Complex Software Systems with Information-Theoretic Monitoring. 510-522 - Issa Khalil

:
ELMO: Energy Aware Local Monitoring in Sensor Networks. 523-536 - Ilia Polian, John P. Hayes, Sudhakar M. Reddy, Bernd Becker

:
Modeling and Mitigating Transient Errors in Logic Circuits. 537-547 - Paolo D'Arco, Alfredo De Santis

:
On Ultralightweight RFID Authentication Protocols. 548-563 - Yair Amir, Brian A. Coan, Jonathan Kirsch, John Lane:

Prime: Byzantine Replication under Attack. 564-577 - Alberto Trombetta

, Wei Jiang, Elisa Bertino, Lorenzo Bossi:
Privacy-Preserving Updates to Anonymous and Confidential Databases. 578-587 - Babak Salamat, Todd Jackson, Gregor Wagner, Christian Wimmer, Michael Franz:

Runtime Defense against Code Injection Attacks Using Replicated Execution. 588-601 - Christopher Ferguson, Qijun Gu:

Self-Healing Control Flow Protection in Sensor Applications. 602-616 - Krishna K. Ramachandran, Biplab Sikdar

:
Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks. 617-623
Volume 8, Number 5, September - October 2011
- Richard Ekwall, André Schiper:

A Fault-Tolerant Token-Based Atomic Broadcast Algorithm. 625-639 - Karthik Pattabiraman, Giacinto Paolo Saggese

, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Automated Derivation of Application-Specific Error Detectors Using Dynamic Analysis. 640-655 - Hao Yang, Eric Osterweil, Daniel Massey, Songwu Lu, Lixia Zhang:

Deploying Cryptography in Internet-Scale Systems: A Case Study on DNSSEC. 656-669 - Arati Baliga, Vinod Ganapathy, Liviu Iftode:

Detecting Kernel-Level Rootkits Using Data Structure Invariants. 670-684 - Mauro Conti

, Roberto Di Pietro
, Luigi Vincenzo Mancini
, Alessandro Mei
:
Distributed Detection of Clone Attacks in Wireless Sensor Networks. 685-698 - Ali Al Shidhani, Victor C. M. Leung

:
Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers. 699-713 - Omer Khan, Sandip Kundu:

Hardware/Software Codesign Architecture for Online Testing in Chip Multiprocessors. 714-727 - Robin Snader, Nikita Borisov

:
Improving Security and Performance in the Tor Network through Tunable Path Selection. 728-741 - Carmela Troncoso

, George Danezis, Eleni Kosta, Josep Balasch
, Bart Preneel
:
PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance. 742-755 - Yu Wang

, Hong Luo, Ku He, Rong Luo, Huazhong Yang, Yuan Xie:
Temperature-Aware NBTI Modeling and the Impact of Standby Leakage Reduction Techniques on Circuit Performance Degradation. 756-769 - Tieyan Li, Guilin Wang:

Analyzing a Family of Key Protection Schemes against Modification Attacks. 770-776 - Dionysia K. Petraki, Markos P. Anastasopoulos

, Symeon Papavassiliou:
Secrecy Capacity for Satellite Networks under Rain Fading. 777-782
Volume 8, Number 6, November - December 2011
- Steven Gianvecchio, Haining Wang:

An Entropy-Based Approach to Detecting Covert Timing Channels. 785-797 - Juan A. Carrasco, Víctor Suñé:

A Numerical Method for the Evaluation of the Distribution of Cumulative Reward till Exit of a Subset of Transient States of a Markov Reward Model. 798-809 - Zheng Yan

, Christian Prehofer:
Autonomic Trust Management for a Component-Based Software System. 810-823 - Levente Buttyán, László Czap, István Vajda:

Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes. 824-838 - Kenichi Kourai

, Shigeru Chiba:
Fast Software Rejuvenation of Virtual Machine Monitors. 839-851 - Hejiao Huang, Hélène Kirchner:

Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets. 852-865 - Vadim Drabkin, Roy Friedman, Gabriel Kliot, Marc Segal:

On Reliable Dissemination in Wireless Ad Hoc Networks. 866-882 - Yuqing Sun

, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah:
On the Complexity of Authorization in RBAC under Qualification and Security Constraints. 883-897 - Giorgio Calandriello, Panos Papadimitratos

, Jean-Pierre Hubaux, Antonio Lioy
:
On the Performance of Secure Vehicular Communication Systems. 898-912 - Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, Richard D. Schlichting:

Probabilistic Model-Driven Recovery in Distributed Systems. 913-928 - Jiang Wu, Douglas R. Stinson:

Three Improved Algorithms for Multipath Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission. 929-937 - Senthilkumar Chinnappa Gounder Periaswamy, Dale R. Thompson, Jia Di:

Fingerprinting RFID Tags. 938-943

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














