Search dblp for Publications

export results for "toc:db/journals/tdsc/tdsc17.bht:"

 download as .bib file

@article{DBLP:journals/tdsc/0001TWQ20,
  author       = {Zheng Zheng and
                  Kishor S. Trivedi and
                  Nan Wang and
                  Kun Qiu},
  title        = {Markov Regenerative Models of WebServers for Their User-Perceived
                  Availability and Bottlenecks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {92--105},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2753803},
  doi          = {10.1109/TDSC.2017.2753803},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/0001TWQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0004ZFGZZ20,
  author       = {Yuan Zhang and
                  Boyu Zhu and
                  Yixin Fang and
                  Suxin Guo and
                  Aidong Zhang and
                  Sheng Zhong},
  title        = {Secure Inter-Domain Forwarding Loop Test in Software Defined Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {162--178},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2731773},
  doi          = {10.1109/TDSC.2017.2731773},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/0004ZFGZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0026LDL20,
  author       = {Yang Yang and
                  Ximeng Liu and
                  Robert H. Deng and
                  Yingjiu Li},
  title        = {Lightweight Sharable and Traceable Secure Mobile Health System},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {78--91},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2729556},
  doi          = {10.1109/TDSC.2017.2729556},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/0026LDL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AbrathCMBS20,
  author       = {Bert Abrath and
                  Bart Coppens and
                  Mohit Mishra and
                  Jens Van den Broeck and
                  Bjorn De Sutter},
  title        = {{\textdollar}{\textbackslash}Delta{\textdollar}{\(\Delta\)}Breakpad:
                  Diversified Binary Crash Reporting},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {841--856},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2823751},
  doi          = {10.1109/TDSC.2018.2823751},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/AbrathCMBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AizpuruaPM20,
  author       = {Jose Ignacio Aizpurua and
                  Yiannis Papadopoulos and
                  Guillaume Merle},
  title        = {Explicit Modelling and Treatment of Repair in Prediction of Dependability},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1147--1162},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2857810},
  doi          = {10.1109/TDSC.2018.2857810},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/AizpuruaPM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BehniaOY20,
  author       = {Rouzbeh Behnia and
                  Muslum Ozgur Ozmen and
                  Attila Altay Yavuz},
  title        = {Lattice-Based Public Key Searchable Encryption from Experimental Perspectives},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1269--1282},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2867462},
  doi          = {10.1109/TDSC.2018.2867462},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/BehniaOY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BergeCGW20,
  author       = {Pierre Berg{\'{e}} and
                  Jason Crampton and
                  Gregory Z. Gutin and
                  R{\'{e}}mi Watrigant},
  title        = {The Authorization Policy Existence Problem},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1333--1344},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2883416},
  doi          = {10.1109/TDSC.2018.2883416},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/BergeCGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CatuognoGP20,
  author       = {Luigi Catuogno and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Secure Dependency Enforcement in Package Management Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {377--390},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2777991},
  doi          = {10.1109/TDSC.2017.2777991},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CatuognoGP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChakrabortyPS20,
  author       = {Tanmoy Chakraborty and
                  Fabio Pierazzi and
                  V. S. Subrahmanian},
  title        = {{EC2:} Ensemble Clustering and Classification for Predicting Android
                  Malware Families},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {262--277},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2739145},
  doi          = {10.1109/TDSC.2017.2739145},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChakrabortyPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenHCP20,
  author       = {Jiayi Chen and
                  Jianping He and
                  Lin Cai and
                  Jianping Pan},
  title        = {Disclose More and Risk Less: Privacy Preserving Online Social Network
                  Data Sharing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1173--1187},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2861403},
  doi          = {10.1109/TDSC.2018.2861403},
  timestamp    = {Wed, 16 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChenHCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenZCZQS20,
  author       = {Dajiang Chen and
                  Ning Zhang and
                  Nan Cheng and
                  Kuan Zhang and
                  Zhiguang Qin and
                  Xuemin Shen},
  title        = {Physical Layer based Message Authentication with Secure Channel Codes},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {1079--1093},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2846258},
  doi          = {10.1109/TDSC.2018.2846258},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChenZCZQS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Cid-FuentesSF20,
  author       = {Javier {\'{A}}lvarez Cid{-}Fuentes and
                  Claudia Szabo and
                  Katrina Falkner},
  title        = {Adaptive Performance Anomaly Detection in Distributed Systems Using
                  Online SVMs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {928--941},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2821693},
  doi          = {10.1109/TDSC.2018.2821693},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Cid-FuentesSF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CleemputSB20,
  author       = {Jeroen Van Cleemput and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  title        = {Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {35--49},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2729549},
  doi          = {10.1109/TDSC.2017.2729549},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CleemputSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CuiAR20,
  author       = {Shujie Cui and
                  Muhammad Rizwan Asghar and
                  Giovanni Russello},
  title        = {Multi-CDN: Towards Privacy in Content Delivery Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {984--999},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2833110},
  doi          = {10.1109/TDSC.2018.2833110},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CuiAR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DingYD20,
  author       = {Wenxiu Ding and
                  Zheng Yan and
                  Robert H. Deng},
  title        = {Privacy-Preserving Data Processing with Flexible Access Control},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {363--376},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2786247},
  doi          = {10.1109/TDSC.2017.2786247},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DingYD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DongWMPGG20,
  author       = {Boxiang Dong and
                  Hui Wang and
                  Anna Monreale and
                  Dino Pedreschi and
                  Fosca Giannotti and
                  Wenge Guo},
  title        = {Authenticated Outlier Mining for Outsourced Databases},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {222--235},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2754493},
  doi          = {10.1109/TDSC.2017.2754493},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/DongWMPGG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Dorojevets20,
  author       = {Mikhail Dorojevets},
  title        = {Energy-Efficient Superconductor Bloom Filters for Streaming Data Inspection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {1015--1025},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2843318},
  doi          = {10.1109/TDSC.2018.2843318},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Dorojevets20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/EmuraHI20,
  author       = {Keita Emura and
                  Takuya Hayashi and
                  Ai Ishida},
  title        = {Group Signatures with Time-Bound Keys Revisited: {A} New Model, an
                  Efficient Construction, and its Implementation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {292--305},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2754247},
  doi          = {10.1109/TDSC.2017.2754247},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/EmuraHI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ErrapotuLYRPPH20,
  author       = {Sai Mounika Errapotu and
                  Hongning Li and
                  Rong Yu and
                  Shaolei Ren and
                  Qingqi Pei and
                  Miao Pan and
                  Zhu Han},
  title        = {Clock Auction Inspired Privacy Preserving Emergency Demand Response
                  in Colocation Data Centers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {691--702},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2875732},
  doi          = {10.1109/TDSC.2018.2875732},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ErrapotuLYRPPH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/EspositoFCPS20,
  author       = {Christian Esposito and
                  Massimo Ficco and
                  Aniello Castiglione and
                  Francesco Palmieri and
                  Alfredo De Santis},
  title        = {Distributed Group Key Management for Event Notification Confidentiality
                  Among Sensors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {566--580},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2799227},
  doi          = {10.1109/TDSC.2018.2799227},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/EspositoFCPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FengYZC20,
  author       = {Jun Feng and
                  Laurence T. Yang and
                  Qing Zhu and
                  Kim{-}Kwang Raymond Choo},
  title        = {Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated
                  Cloud Environment},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {857--868},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2881452},
  doi          = {10.1109/TDSC.2018.2881452},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/FengYZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GovindarajGK20,
  author       = {Rekha Govindaraj and
                  Swaroop Ghosh and
                  Srinivas Katkoori},
  title        = {Design, Analysis and Application of Embedded Resistive {RAM} Based
                  Strong Arbiter {PUF}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1232--1242},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2866425},
  doi          = {10.1109/TDSC.2018.2866425},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/GovindarajGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuerraouiM20,
  author       = {Rachid Guerraoui and
                  Alexandre Maurer},
  title        = {The Cost of Scaling a Reliable Interconnection Topology},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {1039--1050},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2845402},
  doi          = {10.1109/TDSC.2018.2845402},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/GuerraouiM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HanCCLFXW20,
  author       = {Weili Han and
                  Chang Cao and
                  Hao Chen and
                  Dong Li and
                  Zheran Fang and
                  Wenyuan Xu and
                  X. Sean Wang},
  title        = {senDroid: Auditing Sensor Access in Android System-Wide},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {407--421},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2768536},
  doi          = {10.1109/TDSC.2017.2768536},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HanCCLFXW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HeGWWLY20,
  author       = {Kai He and
                  Jun Guo and
                  Jian Weng and
                  Jiasi Weng and
                  Joseph K. Liu and
                  Xun Yi},
  title        = {Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted
                  Data},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1207--1217},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2864186},
  doi          = {10.1109/TDSC.2018.2864186},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/HeGWWLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HeZWC20,
  author       = {Debiao He and
                  Yudi Zhang and
                  Ding Wang and
                  Kim{-}Kwang Raymond Choo},
  title        = {Secure and Efficient Two-Party Signing Protocol for the Identity-Based
                  Signature Scheme in the {IEEE} {P1363} Standard for Public Key Cryptography},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {1124--1132},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2857775},
  doi          = {10.1109/TDSC.2018.2857775},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HeZWC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HolgadoVV20,
  author       = {Pilar Holgado and
                  V{\'{\i}}ctor A. Villagr{\'{a}} and
                  Luis V{\'{a}}zquez},
  title        = {Real-Time Multistep Attack Prediction Based on Hidden Markov Models},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {134--147},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2751478},
  doi          = {10.1109/TDSC.2017.2751478},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HolgadoVV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HongXGWH20,
  author       = {Jianan Hong and
                  Kaiping Xue and
                  Na Gai and
                  David S. L. Wei and
                  Peilin Hong},
  title        = {Service Outsourcing in {F2C} Architecture with Attribute-based Anonymous
                  Access Control and Bounded Service Number},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {1051--1062},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2845381},
  doi          = {10.1109/TDSC.2018.2845381},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HongXGWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuLC20,
  author       = {Ziyuan Hu and
                  Shengli Liu and
                  Kefei Chen},
  title        = {Privacy-Preserving Location-Based Services Query Scheme Against Quantum
                  Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {972--983},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2831199},
  doi          = {10.1109/TDSC.2018.2831199},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HuLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuangSKKN20,
  author       = {Chin{-}Tser Huang and
                  Muhammad N. Sakib and
                  Charles A. Kamhoua and
                  Kevin A. Kwiat and
                  Laurent Njilla},
  title        = {A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1257--1268},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2866821},
  doi          = {10.1109/TDSC.2018.2866821},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/HuangSKKN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuangZPX20,
  author       = {Yonggang Huang and
                  Jun Zhang and
                  Lei Pan and
                  Yang Xiang},
  title        = {Privacy Protection in Interactive Content Based Image Retrieval},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {595--607},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2793923},
  doi          = {10.1109/TDSC.2018.2793923},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HuangZPX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/InanGS20,
  author       = {Ali Inan and
                  Mehmet Emre Gursoy and
                  Y{\"{u}}cel Saygin},
  title        = {Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds
                  and Efficient Algorithms},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {194--207},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2734664},
  doi          = {10.1109/TDSC.2017.2734664},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/InanGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ItkinW20,
  author       = {Eyal Itkin and
                  Avishai Wool},
  title        = {A Security Analysis and Revised Security Extension for the Precision
                  Time Protocol},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {22--34},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2748583},
  doi          = {10.1109/TDSC.2017.2748583},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ItkinW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JangK20,
  author       = {Jinsoo Jang and
                  Brent ByungHoon Kang},
  title        = {Retrofitting the Partially Privileged Mode for {TEE} Communication
                  Channel Protection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {1000--1014},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2840709},
  doi          = {10.1109/TDSC.2018.2840709},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JangK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiangXWLW20,
  author       = {Linzhi Jiang and
                  Chunxiang Xu and
                  Xiaofang Wang and
                  Bo Luo and
                  Huaqun Wang},
  title        = {Secure outsourcing {SIFT:} Efficient and Privacy-Preserving Image
                  Feature Extraction in the Encrypted Domain},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {179--193},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2751476},
  doi          = {10.1109/TDSC.2017.2751476},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JiangXWLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JohnHOD20,
  author       = {Tara Merin John and
                  Syed Kamran Haider and
                  Hamza Omar and
                  Marten van Dijk},
  title        = {Connecting the Dots: Privacy Leakage via Write-Access Patterns to
                  the Main Memory},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {436--442},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2779780},
  doi          = {10.1109/TDSC.2017.2779780},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JohnHOD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JumaSBT20,
  author       = {Nahid Juma and
                  Jonathan Shahen and
                  Khalid Zaman Bijon and
                  Mahesh Tripunitara},
  title        = {The Overhead from Combating Side-Channels in Cloud Systems Using VM-Scheduling},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {422--435},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2790932},
  doi          = {10.1109/TDSC.2018.2790932},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JumaSBT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KaitovicM20,
  author       = {Igor Kaitovic and
                  Miroslaw Malek},
  title        = {Impact of Failure Prediction on Availability: Modeling and Comparative
                  Analysis of Predictive and Reactive Methods},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {493--505},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2806448},
  doi          = {10.1109/TDSC.2018.2806448},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KaitovicM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KamelSDFB20,
  author       = {Dina Kamel and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Alexandre Duc and
                  Denis Flandre and
                  Francesco Berti},
  title        = {Learning with Physical Noise or Errors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {957--971},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2830763},
  doi          = {10.1109/TDSC.2018.2830763},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KamelSDFB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KaplanGNS20,
  author       = {Emre Kaplan and
                  Mehmet Emre Gursoy and
                  Mehmet Ercan Nergiz and
                  Y{\"{u}}cel Saygin},
  title        = {Known Sample Attacks on Relation Preserving Data Transformations},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {443--450},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2759732},
  doi          = {10.1109/TDSC.2017.2759732},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KaplanGNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KhasawnehODAP20,
  author       = {Khaled N. Khasawneh and
                  Meltem Ozsoy and
                  Caleb Donovick and
                  Nael B. Abu{-}Ghazaleh and
                  Dmitry Ponomarev},
  title        = {EnsembleHMD: Accurate Hardware Malware Detectors with Specialized
                  Ensemble Classifiers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {620--633},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2801858},
  doi          = {10.1109/TDSC.2018.2801858},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KhasawnehODAP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KlempererJPH20,
  author       = {Peter F. Klemperer and
                  Hye Yoon Jeon and
                  Bryan D. Payne and
                  James C. Hoe},
  title        = {High-Performance Memory Snapshotting for Real-Time, Consistent, Hypervisor-Based
                  Monitors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {518--535},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2805904},
  doi          = {10.1109/TDSC.2018.2805904},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KlempererJPH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiCZMWS20,
  author       = {Huaxin Li and
                  Qingrong Chen and
                  Haojin Zhu and
                  Di Ma and
                  Hong Wen and
                  Xuemin Sherman Shen},
  title        = {Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous
                  Social Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {350--362},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2754249},
  doi          = {10.1109/TDSC.2017.2754249},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiCZMWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiLSWLL20,
  author       = {Jing Li and
                  Peng Li and
                  Rebecca J. Stones and
                  Gang Wang and
                  Zhongwei Li and
                  Xiaoguang Liu},
  title        = {Reliability Equations for Cloud Storage Systems with Proactive Fault
                  Tolerance},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {782--794},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2882512},
  doi          = {10.1109/TDSC.2018.2882512},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiLSWLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiZQFR20,
  author       = {Sheng Li and
                  Xinpeng Zhang and
                  Zhenxing Qian and
                  Guorui Feng and
                  Yanli Ren},
  title        = {Key Based Artificial Fingerprint Generation for Privacy Protection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {828--840},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2812192},
  doi          = {10.1109/TDSC.2018.2812192},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiZQFR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiangPK20,
  author       = {Xiaohui Liang and
                  Ronald A. Peterson and
                  David Kotz},
  title        = {Securely Connecting Wearables to Ambient Displays with User Intent},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {676--690},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2840979},
  doi          = {10.1109/TDSC.2018.2840979},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiangPK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuDCYP20,
  author       = {Ximeng Liu and
                  Robert H. Deng and
                  Kim{-}Kwang Raymond Choo and
                  Yang Yang and
                  HweeHwa Pang},
  title        = {Privacy-Preserving Outsourced Calculation Toolkit in the Cloud},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {898--911},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2816656},
  doi          = {10.1109/TDSC.2018.2816656},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuDCYP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuLPRS20,
  author       = {Zhe Liu and
                  Patrick Longa and
                  Geovandro C. C. F. Pereira and
                  Oscar Reparaz and
                  Hwajeong Seo},
  title        = {Four{\textdollar}{\textbackslash}mathbb \{Q\}{\textdollar}Q on Embedded
                  Devices with Strong Countermeasures Against Side-Channel Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {536--549},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2799844},
  doi          = {10.1109/TDSC.2018.2799844},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuLPRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuLZL20,
  author       = {Zishan Liu and
                  Zhenyu Liu and
                  Lin Zhang and
                  Xiaodong Lin},
  title        = {{MARP:} {A} Distributed {MAC} Layer Attack Resistant Pseudonym Scheme
                  for {VANET}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {869--882},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2838136},
  doi          = {10.1109/TDSC.2018.2838136},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuLZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuYMD20,
  author       = {Xueqiao Liu and
                  Guomin Yang and
                  Yi Mu and
                  Robert H. Deng},
  title        = {Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1322--1332},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2876831},
  doi          = {10.1109/TDSC.2018.2876831},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuYMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuLHL20,
  author       = {Li Lu and
                  Lingshuang Liu and
                  Muhammad Jawad Hussain and
                  Yongshuai Liu},
  title        = {I Sense You by Breath: Speaker Recognition via Breath Biometrics},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {306--319},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2767587},
  doi          = {10.1109/TDSC.2017.2767587},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LuLHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaAZLXLMG20,
  author       = {Xiaobo Ma and
                  Bo An and
                  Mengchen Zhao and
                  Xiapu Luo and
                  Lei Xue and
                  Zhenhua Li and
                  Tony T. N. Miu and
                  Xiaohong Guan},
  title        = {Randomized Security Patrolling for Link Flooding Attack Detection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {795--812},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2019.2892370},
  doi          = {10.1109/TDSC.2019.2892370},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaAZLXLMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaZYSHX20,
  author       = {Hui Ma and
                  Rui Zhang and
                  Guomin Yang and
                  Zishuai Song and
                  Kai He and
                  Yuting Xiao},
  title        = {Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical
                  Record Systems with Mobile Devices},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {1026--1038},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2844814},
  doi          = {10.1109/TDSC.2018.2844814},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaZYSHX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaruseacG20,
  author       = {Mihai Maruseac and
                  Gabriel Ghinita},
  title        = {Precision-Enhanced Differentially-Private Mining of High-Confidence
                  Association Rules},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1297--1309},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2868190},
  doi          = {10.1109/TDSC.2018.2868190},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaruseacG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MiCZPWR20,
  author       = {Zeyu Mi and
                  Haibo Chen and
                  Yinqian Zhang and
                  ShuangHe Peng and
                  Xiaofeng Wang and
                  Michael K. Reiter},
  title        = {{CPU} Elasticity to Mitigate Cross-VM Runtime Monitoring},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {1094--1108},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2846742},
  doi          = {10.1109/TDSC.2018.2846742},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MiCZPWR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohaisenGRLKNN20,
  author       = {Aziz Mohaisen and
                  Zhongshu Gu and
                  Kui Ren and
                  Zhenhua Li and
                  Charles A. Kamhoua and
                  Laurent L. Njilla and
                  DaeHun Nyang},
  title        = {Look-Aside at Your Own Risk: Privacy Implications of {DNSSEC} Look-Aside
                  Validation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {745--759},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2816026},
  doi          = {10.1109/TDSC.2018.2816026},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MohaisenGRLKNN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MontieriCAP20,
  author       = {Antonio Montieri and
                  Domenico Ciuonzo and
                  Giuseppe Aceto and
                  Antonio Pescap{\`{e}}},
  title        = {Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {662--675},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2804394},
  doi          = {10.1109/TDSC.2018.2804394},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MontieriCAP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MunirK20,
  author       = {Arslan Munir and
                  Farinaz Koushanfar},
  title        = {Design and Analysis of Secure and Dependable Automotive {CPS:} {A}
                  Steer-by-Wire Case Study},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {813--827},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2846741},
  doi          = {10.1109/TDSC.2018.2846741},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MunirK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NaroueiTN20,
  author       = {Masoud Narouei and
                  Hassan Takabi and
                  Rodney Nielsen},
  title        = {Automatic Extraction of Access Control Policies from Natural Language
                  Documents},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {506--517},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2818708},
  doi          = {10.1109/TDSC.2018.2818708},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/NaroueiTN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NiZYLS20,
  author       = {Jianbing Ni and
                  Kuan Zhang and
                  Yong Yu and
                  Xiaodong Lin and
                  Xuemin Sherman Shen},
  title        = {Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing
                  via Fog Computing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {581--594},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2791432},
  doi          = {10.1109/TDSC.2018.2791432},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/NiZYLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OuQLHJ20,
  author       = {Lu Ou and
                  Zheng Qin and
                  Shaolin Liao and
                  Yuan Hong and
                  Xiaohua Jia},
  title        = {Releasing Correlated Trajectories: Towards High Utility and Optimal
                  Differential Privacy},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {1109--1123},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2853105},
  doi          = {10.1109/TDSC.2018.2853105},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/OuQLHJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/PanH0G0TC20,
  author       = {Yanjun Pan and
                  Yantian Hou and
                  Ming Li and
                  Ryan M. Gerdes and
                  Kai Zeng and
                  Md. Asaduzzaman Towfiq and
                  Bedri A. Cetiner},
  title        = {Message Integrity Protection Over Wireless Channel: Countering Signal
                  Cancellation via Channel Randomization},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {106--120},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2751600},
  doi          = {10.1109/TDSC.2017.2751600},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/PanH0G0TC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ParkKRWHX20,
  author       = {Sungjin Park and
                  Chung Hwan Kim and
                  Junghwan Rhee and
                  Jong{-}Jin Won and
                  Taisook Han and
                  Dongyan Xu},
  title        = {{CAFE:} {A} Virtualization-Based Approach to Protecting Sensitive
                  Cloud Application Logic Confidentiality},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {883--897},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2817545},
  doi          = {10.1109/TDSC.2018.2817545},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ParkKRWHX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RahmanD20,
  author       = {Mohammad Ashiqur Rahman and
                  Amarjit Datta},
  title        = {Impact of Stealthy Attacks on Optimal Power Flow: {A} Simulink-Driven
                  Formal Analysis},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {451--464},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2806969},
  doi          = {10.1109/TDSC.2018.2806969},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RahmanD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RajkumarS20,
  author       = {P. V. Rajkumar and
                  Ravi S. Sandhu},
  title        = {Safety Decidability for Pre-Authorization Usage Control with Identifier
                  Attribute Domains},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {465--478},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2839745},
  doi          = {10.1109/TDSC.2018.2839745},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/RajkumarS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SalvePMR20,
  author       = {Andrea De Salve and
                  Roberto Di Pietro and
                  Paolo Mori and
                  Laura Ricci},
  title        = {A Logical Key Hierarchy Based Approach to Preserve Content Privacy
                  in Decentralized Online Social Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {2--21},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2729553},
  doi          = {10.1109/TDSC.2017.2729553},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SalvePMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SatyalWB020,
  author       = {Suhrid Satyal and
                  Ingo Weber and
                  Len Bass and
                  Min Fu},
  title        = {Rollback Mechanisms for Cloud Management APIs Using {AI} Planning},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {148--161},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2729543},
  doi          = {10.1109/TDSC.2017.2729543},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SatyalWB020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SaxenaSKCC20,
  author       = {Neetesh Saxena and
                  Hong Shen and
                  Nikos Komninos and
                  Kim{-}Kwang Raymond Choo and
                  Narendra S. Chaudhari},
  title        = {{BVPSMS:} {A} Batch Verification Protocol for End-to-End Secure {SMS}
                  for Mobile Users},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {550--565},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2799223},
  doi          = {10.1109/TDSC.2018.2799223},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/SaxenaSKCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShahzadSL20,
  author       = {Muhammad Shahzad and
                  M. Zubair Shafiq and
                  Alex X. Liu},
  title        = {Large Scale Characterization of Software Vulnerability Life Cycles},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {730--744},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2019.2893950},
  doi          = {10.1109/TDSC.2019.2893950},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShahzadSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShenCGM20,
  author       = {Chao Shen and
                  Yufei Chen and
                  Xiaohong Guan and
                  Roy A. Maxion},
  title        = {Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active
                  User Authentication System},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {335--349},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2771295},
  doi          = {10.1109/TDSC.2017.2771295},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShenCGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShenLSG20,
  author       = {Zhirong Shen and
                  Patrick P. C. Lee and
                  Jiwu Shu and
                  Wenzhong Guo},
  title        = {Cross-Rack-Aware Single Failure Recovery for Clustered File Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {248--261},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2774299},
  doi          = {10.1109/TDSC.2017.2774299},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShenLSG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SongDYXZ20,
  author       = {Xiangfu Song and
                  Changyu Dong and
                  Dandan Yuan and
                  Qiuliang Xu and
                  Minghao Zhao},
  title        = {Forward Private Searchable Symmetric Encryption with Optimized {I/O}
                  Efficiency},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {912--927},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2822294},
  doi          = {10.1109/TDSC.2018.2822294},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SongDYXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SongHH20,
  author       = {Wei Song and
                  Qingqing Huang and
                  Jeff Huang},
  title        = {Understanding JavaScript Vulnerabilities in Large Real-World Android
                  Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {1063--1078},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2845851},
  doi          = {10.1109/TDSC.2018.2845851},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SongHH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SrinivasDKR20,
  author       = {Jangirala Srinivas and
                  Ashok Kumar Das and
                  Neeraj Kumar and
                  Joel J. P. C. Rodrigues},
  title        = {Cloud Centric Authentication for Wearable Healthcare Monitoring System},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {942--956},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2828306},
  doi          = {10.1109/TDSC.2018.2828306},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SrinivasDKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SrinivasDWK20,
  author       = {Jangirala Srinivas and
                  Ashok Kumar Das and
                  Mohammad Wazid and
                  Neeraj Kumar},
  title        = {Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement
                  Protocol for Industrial Internet of Things},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1133--1146},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2857811},
  doi          = {10.1109/TDSC.2018.2857811},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/SrinivasDWK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TianYRTP20,
  author       = {Ke Tian and
                  Danfeng Yao and
                  Barbara G. Ryder and
                  Gang Tan and
                  Guojun Peng},
  title        = {Detection of Repackaged Android Malware with Code-Heterogeneity Features},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {64--77},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2745575},
  doi          = {10.1109/TDSC.2017.2745575},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TianYRTP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Vaidya20,
  author       = {Jaideep Vaidya},
  title        = {Editorial},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {1},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2019.2958396},
  doi          = {10.1109/TDSC.2019.2958396},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Vaidya20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ViscontiG20,
  author       = {Andrea Visconti and
                  Federico Gorla},
  title        = {Exploiting an {HMAC-SHA-1} Optimization to Speed up {PBKDF2}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {775--781},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2878697},
  doi          = {10.1109/TDSC.2018.2878697},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ViscontiG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WalzS20,
  author       = {Andreas Walz and
                  Axel Sikora},
  title        = {Exploiting Dissent: Towards Fuzzing-Based Differential Black-Box Testing
                  of {TLS} Implementations},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {278--291},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2763947},
  doi          = {10.1109/TDSC.2017.2763947},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WalzS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangCCM20,
  author       = {An Wang and
                  Wentao Chang and
                  Songqing Chen and
                  Aziz Mohaisen},
  title        = {A Data-Driven Study of DDoS Attacks and Their Dynamics},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {648--661},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2808344},
  doi          = {10.1109/TDSC.2018.2808344},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangCCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WazidDOKS20,
  author       = {Mohammad Wazid and
                  Ashok Kumar Das and
                  Vanga Odelu and
                  Neeraj Kumar and
                  Willy Susilo},
  title        = {Secure Remote User Authenticated Key Establishment Protocol for Smart
                  Home Environment},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {391--406},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2764083},
  doi          = {10.1109/TDSC.2017.2764083},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WazidDOKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XieFHLSL20,
  author       = {Yulai Xie and
                  Dan Feng and
                  Yuchong Hu and
                  Yan Li and
                  Staunton Sample and
                  Darrell D. E. Long},
  title        = {Pagoda: {A} Hybrid Approach to Enable Efficient Real-Time Provenance
                  Based Intrusion Detection in Big Data Environments},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1283--1296},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2867595},
  doi          = {10.1109/TDSC.2018.2867595},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XieFHLSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuTCW20,
  author       = {Wenyuan Xu and
                  Jing Tian and
                  Yu Cao and
                  Song Wang},
  title        = {Challenge-Response Authentication Using In-Air Handwriting Style Verification},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {51--64},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2752164},
  doi          = {10.1109/TDSC.2017.2752164},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuTCW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuZZL20,
  author       = {Hui Xu and
                  Zirui Zhao and
                  Yangfan Zhou and
                  Michael R. Lyu},
  title        = {Benchmarking the Capability of Symbolic Execution Tools with Logic
                  Bombs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1243--1256},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2866469},
  doi          = {10.1109/TDSC.2018.2866469},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuZZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangLD20,
  author       = {Yang Yang and
                  Ximeng Liu and
                  Robert H. Deng},
  title        = {Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary
                  Language},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {320--334},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2787588},
  doi          = {10.1109/TDSC.2017.2787588},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YangLD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangLYT20,
  author       = {Lu{-}Xing Yang and
                  Pengdeng Li and
                  Xiaofan Yang and
                  Yuan Yan Tang},
  title        = {A Risk Management Approach to Defending Against the Advanced Persistent
                  Threat},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1163--1172},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2858786},
  doi          = {10.1109/TDSC.2018.2858786},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/YangLYT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YaoFDFW20,
  author       = {Lin Yao and
                  Zhenzhen Fan and
                  Jing Deng and
                  Xin Fan and
                  Guowei Wu},
  title        = {Detection and Defense of Cache Pollution Attacks Using Clustering
                  in Named Data Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1310--1321},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2876257},
  doi          = {10.1109/TDSC.2018.2876257},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/YaoFDFW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YouLSWZ20,
  author       = {Wei You and
                  Bin Liang and
                  Wenchang Shi and
                  Peng Wang and
                  Xiangyu Zhang},
  title        = {TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified
                  and Non-Rooted Android Devices},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {209--222},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2740169},
  doi          = {10.1109/TDSC.2017.2740169},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YouLSWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangL20,
  author       = {Yan Zhang and
                  Loukas Lazos},
  title        = {Misbehavior in Multi-Channel {MAC} Protocols},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {760--774},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2819170},
  doi          = {10.1109/TDSC.2018.2819170},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangMCZD20,
  author       = {Lei Zhang and
                  Xinyu Meng and
                  Kim{-}Kwang Raymond Choo and
                  Yuanfei Zhang and
                  Feifei Dai},
  title        = {Privacy-Preserving Cloud Establishment and Data Dissemination Scheme
                  for Vehicular Cloud},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {634--647},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2797190},
  doi          = {10.1109/TDSC.2018.2797190},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangMCZD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangYHWR20,
  author       = {Yue Zhang and
                  Jia Yu and
                  Rong Hao and
                  Cong Wang and
                  Kui Ren},
  title        = {Enabling Efficient User Revocation in Identity-Based Cloud Storage
                  Auditing for Shared Big Data},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {608--619},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2829880},
  doi          = {10.1109/TDSC.2018.2829880},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangYHWR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangZHC20,
  author       = {Zhikun Zhang and
                  Heng Zhang and
                  Shibo He and
                  Peng Cheng},
  title        = {Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven
                  Cognitive Radio Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {236--247},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2781248},
  doi          = {10.1109/TDSC.2017.2781248},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangZHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangZWWSR20,
  author       = {Leo Yu Zhang and
                  Yifeng Zheng and
                  Jian Weng and
                  Cong Wang and
                  Zihao Shan and
                  Kui Ren},
  title        = {You Can Access but You Cannot Leak: Defending Against Illegal Content
                  Redistribution in Encrypted Cloud Media Center},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1218--1231},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2864748},
  doi          = {10.1109/TDSC.2018.2864748},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangZWWSR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoC20,
  author       = {Liang Zhao and
                  Liqun Chen},
  title        = {Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced)
                  Computation, Revisited},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1188--1206},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2861699},
  doi          = {10.1109/TDSC.2018.2861699},
  timestamp    = {Wed, 08 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhaoC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoKKKN20,
  author       = {Hong Zhao and
                  Luke Kwiat and
                  Kevin A. Kwiat and
                  Charles A. Kamhoua and
                  Laurent Njilla},
  title        = {Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {716--729},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2864733},
  doi          = {10.1109/TDSC.2018.2864733},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhaoKKKN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhengDY020,
  author       = {Yifeng Zheng and
                  Huayi Duan and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {121--133},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2753245},
  doi          = {10.1109/TDSC.2017.2753245},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhengDY020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuLZM20,
  author       = {Xiaonan Zhu and
                  Jinku Li and
                  Yajin Zhou and
                  Jianfeng Ma},
  title        = {AdCapsule: Practical Confinement of Advertisements in Android Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {479--492},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2814999},
  doi          = {10.1109/TDSC.2018.2814999},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhuLZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuLZQ20,
  author       = {Liehuang Zhu and
                  Meng Li and
                  Zijian Zhang and
                  Zhan Qin},
  title        = {{ASAP:} An Anonymous Smart-Parking and Payment Scheme in Vehicular
                  Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {703--715},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2850780},
  doi          = {10.1109/TDSC.2018.2850780},
  timestamp    = {Wed, 19 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhuLZQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics