default search action
IEEE Transactions on Dependable and Secure Computing, Volume 17
Volume 17, Number 1, January - February 2020
- Jaideep Vaidya
:
Editorial. 1 - Andrea De Salve
, Roberto Di Pietro
, Paolo Mori
, Laura Ricci
:
A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks. 2-21 - Eyal Itkin, Avishai Wool
:
A Security Analysis and Revised Security Extension for the Precision Time Protocol. 22-34 - Jeroen Van Cleemput
, Bjorn De Sutter
, Koen De Bosschere:
Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks. 35-49 - Wenyuan Xu
, Jing Tian
, Yu Cao, Song Wang
:
Challenge-Response Authentication Using In-Air Handwriting Style Verification. 51-64 - Ke Tian
, Danfeng Yao
, Barbara G. Ryder
, Gang Tan
, Guojun Peng:
Detection of Repackaged Android Malware with Code-Heterogeneity Features. 64-77 - Yang Yang
, Ximeng Liu
, Robert H. Deng
, Yingjiu Li
:
Lightweight Sharable and Traceable Secure Mobile Health System. 78-91 - Zheng Zheng
, Kishor S. Trivedi
, Nan Wang, Kun Qiu
:
Markov Regenerative Models of WebServers for Their User-Perceived Availability and Bottlenecks. 92-105 - Yanjun Pan
, Yantian Hou
, Ming Li
, Ryan M. Gerdes, Kai Zeng
, Md. Asaduzzaman Towfiq
, Bedri A. Cetiner
:
Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization. 106-120 - Yifeng Zheng
, Huayi Duan
, Xingliang Yuan
, Cong Wang
:
Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery. 121-133 - Pilar Holgado
, Víctor A. Villagrá
, Luis Vázquez:
Real-Time Multistep Attack Prediction Based on Hidden Markov Models. 134-147 - Suhrid Satyal
, Ingo Weber
, Len Bass, Min Fu:
Rollback Mechanisms for Cloud Management APIs Using AI Planning. 148-161 - Yuan Zhang
, Boyu Zhu, Yixin Fang, Suxin Guo, Aidong Zhang
, Sheng Zhong:
Secure Inter-Domain Forwarding Loop Test in Software Defined Networks. 162-178 - Linzhi Jiang
, Chunxiang Xu, Xiaofang Wang, Bo Luo
, Huaqun Wang:
Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain. 179-193 - Ali Inan
, Mehmet Emre Gursoy
, Yücel Saygin
:
Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms. 194-207 - Wei You
, Bin Liang
, Wenchang Shi
, Peng Wang, Xiangyu Zhang:
TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices. 209-222
Volume 17, Number 2, March - April 2020
- Boxiang Dong
, Hui Wang, Anna Monreale
, Dino Pedreschi
, Fosca Giannotti, Wenge Guo:
Authenticated Outlier Mining for Outsourced Databases. 222-235 - Zhikun Zhang
, Heng Zhang
, Shibo He
, Peng Cheng
:
Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks. 236-247 - Zhirong Shen
, Patrick P. C. Lee
, Jiwu Shu, Wenzhong Guo
:
Cross-Rack-Aware Single Failure Recovery for Clustered File Systems. 248-261 - Tanmoy Chakraborty
, Fabio Pierazzi
, V. S. Subrahmanian:
EC2: Ensemble Clustering and Classification for Predicting Android Malware Families. 262-277 - Andreas Walz
, Axel Sikora
:
Exploiting Dissent: Towards Fuzzing-Based Differential Black-Box Testing of TLS Implementations. 278-291 - Keita Emura
, Takuya Hayashi
, Ai Ishida:
Group Signatures with Time-Bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation. 292-305 - Li Lu
, Lingshuang Liu, Muhammad Jawad Hussain
, Yongshuai Liu:
I Sense You by Breath: Speaker Recognition via Breath Biometrics. 306-319 - Yang Yang
, Ximeng Liu
, Robert H. Deng
:
Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language. 320-334 - Chao Shen
, Yufei Chen
, Xiaohong Guan, Roy A. Maxion:
Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System. 335-349 - Huaxin Li
, Qingrong Chen
, Haojin Zhu
, Di Ma
, Hong Wen
, Xuemin Sherman Shen
:
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks. 350-362 - Wenxiu Ding
, Zheng Yan
, Robert H. Deng
:
Privacy-Preserving Data Processing with Flexible Access Control. 363-376 - Luigi Catuogno
, Clemente Galdi
, Giuseppe Persiano
:
Secure Dependency Enforcement in Package Management Systems. 377-390 - Mohammad Wazid
, Ashok Kumar Das
, Vanga Odelu
, Neeraj Kumar
, Willy Susilo
:
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. 391-406 - Weili Han
, Chang Cao
, Hao Chen
, Dong Li
, Zheran Fang, Wenyuan Xu, X. Sean Wang:
senDroid: Auditing Sensor Access in Android System-Wide. 407-421 - Nahid Juma
, Jonathan Shahen
, Khalid Zaman Bijon
, Mahesh Tripunitara
:
The Overhead from Combating Side-Channels in Cloud Systems Using VM-Scheduling. 422-435 - Tara Merin John
, Syed Kamran Haider
, Hamza Omar
, Marten van Dijk
:
Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory. 436-442 - Emre Kaplan
, Mehmet Emre Gursoy
, Mehmet Ercan Nergiz
, Yücel Saygin
:
Known Sample Attacks on Relation Preserving Data Transformations. 443-450
Volume 17, Number 3, May - June 2020
- Mohammad Ashiqur Rahman
, Amarjit Datta
:
Impact of Stealthy Attacks on Optimal Power Flow: A Simulink-Driven Formal Analysis. 451-464 - P. V. Rajkumar
, Ravi S. Sandhu:
Safety Decidability for Pre-Authorization Usage Control with Identifier Attribute Domains. 465-478 - Xiaonan Zhu, Jinku Li
, Yajin Zhou, Jianfeng Ma:
AdCapsule: Practical Confinement of Advertisements in Android Applications. 479-492 - Igor Kaitovic
, Miroslaw Malek
:
Impact of Failure Prediction on Availability: Modeling and Comparative Analysis of Predictive and Reactive Methods. 493-505 - Masoud Narouei
, Hassan Takabi, Rodney Nielsen:
Automatic Extraction of Access Control Policies from Natural Language Documents. 506-517 - Peter F. Klemperer
, Hye Yoon Jeon, Bryan D. Payne, James C. Hoe
:
High-Performance Memory Snapshotting for Real-Time, Consistent, Hypervisor-Based Monitors. 518-535 - Zhe Liu, Patrick Longa
, Geovandro C. C. F. Pereira
, Oscar Reparaz
, Hwajeong Seo
:
Four$\mathbb {Q}$Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks. 536-549 - Neetesh Saxena
, Hong Shen, Nikos Komninos
, Kim-Kwang Raymond Choo
, Narendra S. Chaudhari:
BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users. 550-565 - Christian Esposito
, Massimo Ficco
, Aniello Castiglione
, Francesco Palmieri
, Alfredo De Santis
:
Distributed Group Key Management for Event Notification Confidentiality Among Sensors. 566-580 - Jianbing Ni
, Kuan Zhang
, Yong Yu
, Xiaodong Lin
, Xuemin Sherman Shen
:
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing. 581-594 - Yonggang Huang
, Jun Zhang
, Lei Pan
, Yang Xiang
:
Privacy Protection in Interactive Content Based Image Retrieval. 595-607 - Yue Zhang
, Jia Yu
, Rong Hao
, Cong Wang
, Kui Ren:
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data. 608-619 - Khaled N. Khasawneh
, Meltem Ozsoy, Caleb Donovick
, Nael B. Abu-Ghazaleh
, Dmitry Ponomarev:
EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers. 620-633 - Lei Zhang
, Xinyu Meng, Kim-Kwang Raymond Choo
, Yuanfei Zhang, Feifei Dai:
Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud. 634-647 - An Wang, Wentao Chang
, Songqing Chen
, Aziz Mohaisen
:
A Data-Driven Study of DDoS Attacks and Their Dynamics. 648-661 - Antonio Montieri
, Domenico Ciuonzo
, Giuseppe Aceto
, Antonio Pescapè
:
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web). 662-675
Volume 17, Number 4, July - August 2020
- Xiaohui Liang
, Ronald A. Peterson, David Kotz
:
Securely Connecting Wearables to Ambient Displays with User Intent. 676-690 - Sai Mounika Errapotu
, Hongning Li
, Rong Yu
, Shaolei Ren
, Qingqi Pei
, Miao Pan
, Zhu Han
:
Clock Auction Inspired Privacy Preserving Emergency Demand Response in Colocation Data Centers. 691-702 - Liehuang Zhu
, Meng Li
, Zijian Zhang
, Zhan Qin:
ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks. 703-715 - Hong Zhao
, Luke Kwiat, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection. 716-729 - Muhammad Shahzad
, M. Zubair Shafiq, Alex X. Liu
:
Large Scale Characterization of Software Vulnerability Life Cycles. 730-744 - Aziz Mohaisen
, Zhongshu Gu
, Kui Ren, Zhenhua Li
, Charles A. Kamhoua, Laurent L. Njilla, DaeHun Nyang
:
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation. 745-759 - Yan Zhang, Loukas Lazos
:
Misbehavior in Multi-Channel MAC Protocols. 760-774 - Andrea Visconti
, Federico Gorla
:
Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2. 775-781 - Jing Li
, Peng Li, Rebecca J. Stones
, Gang Wang
, Zhongwei Li, Xiaoguang Liu
:
Reliability Equations for Cloud Storage Systems with Proactive Fault Tolerance. 782-794 - Xiaobo Ma
, Bo An, Mengchen Zhao, Xiapu Luo
, Lei Xue
, Zhenhua Li
, Tony T. N. Miu, Xiaohong Guan:
Randomized Security Patrolling for Link Flooding Attack Detection. 795-812 - Arslan Munir
, Farinaz Koushanfar
:
Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study. 813-827 - Sheng Li
, Xinpeng Zhang
, Zhenxing Qian
, Guorui Feng
, Yanli Ren
:
Key Based Artificial Fingerprint Generation for Privacy Protection. 828-840 - Bert Abrath
, Bart Coppens
, Mohit Mishra
, Jens Van den Broeck
, Bjorn De Sutter
:
$\Delta$ΔBreakpad: Diversified Binary Crash Reporting. 841-856 - Jun Feng
, Laurence T. Yang
, Qing Zhu, Kim-Kwang Raymond Choo
:
Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment. 857-868 - Zishan Liu
, Zhenyu Liu
, Lin Zhang
, Xiaodong Lin
:
MARP: A Distributed MAC Layer Attack Resistant Pseudonym Scheme for VANET. 869-882 - Sungjin Park
, Chung Hwan Kim
, Junghwan Rhee, Jong-Jin Won, Taisook Han
, Dongyan Xu:
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality. 883-897
Volume 17, Number 5, September - October 2020
- Ximeng Liu
, Robert H. Deng
, Kim-Kwang Raymond Choo
, Yang Yang
, HweeHwa Pang
:
Privacy-Preserving Outsourced Calculation Toolkit in the Cloud. 898-911 - Xiangfu Song
, Changyu Dong
, Dandan Yuan, Qiuliang Xu
, Minghao Zhao:
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. 912-927 - Javier Álvarez Cid-Fuentes
, Claudia Szabo
, Katrina Falkner:
Adaptive Performance Anomaly Detection in Distributed Systems Using Online SVMs. 928-941 - Jangirala Srinivas
, Ashok Kumar Das
, Neeraj Kumar
, Joel J. P. C. Rodrigues
:
Cloud Centric Authentication for Wearable Healthcare Monitoring System. 942-956 - Dina Kamel
, François-Xavier Standaert
, Alexandre Duc, Denis Flandre
, Francesco Berti
:
Learning with Physical Noise or Errors. 957-971 - Ziyuan Hu
, Shengli Liu, Kefei Chen
:
Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks. 972-983 - Shujie Cui
, Muhammad Rizwan Asghar
, Giovanni Russello:
Multi-CDN: Towards Privacy in Content Delivery Networks. 984-999 - Jinsoo Jang
, Brent ByungHoon Kang
:
Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection. 1000-1014 - Mikhail Dorojevets
:
Energy-Efficient Superconductor Bloom Filters for Streaming Data Inspection. 1015-1025 - Hui Ma
, Rui Zhang
, Guomin Yang
, Zishuai Song, Kai He, Yuting Xiao
:
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices. 1026-1038 - Rachid Guerraoui
, Alexandre Maurer
:
The Cost of Scaling a Reliable Interconnection Topology. 1039-1050 - Jianan Hong, Kaiping Xue
, Na Gai, David S. L. Wei
, Peilin Hong
:
Service Outsourcing in F2C Architecture with Attribute-based Anonymous Access Control and Bounded Service Number. 1051-1062 - Wei Song
, Qingqing Huang, Jeff Huang:
Understanding JavaScript Vulnerabilities in Large Real-World Android Applications. 1063-1078 - Dajiang Chen
, Ning Zhang
, Nan Cheng
, Kuan Zhang
, Zhiguang Qin
, Xuemin Shen
:
Physical Layer based Message Authentication with Secure Channel Codes. 1079-1093 - Zeyu Mi
, Haibo Chen
, Yinqian Zhang, ShuangHe Peng, Xiaofeng Wang, Michael K. Reiter
:
CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. 1094-1108 - Lu Ou
, Zheng Qin
, Shaolin Liao
, Yuan Hong
, Xiaohua Jia
:
Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy. 1109-1123 - Debiao He
, Yudi Zhang
, Ding Wang
, Kim-Kwang Raymond Choo
:
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. 1124-1132
Volume 17, Number 6, November - December 2020
- Jangirala Srinivas
, Ashok Kumar Das
, Mohammad Wazid
, Neeraj Kumar
:
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things. 1133-1146 - Jose Ignacio Aizpurua
, Yiannis Papadopoulos
, Guillaume Merle:
Explicit Modelling and Treatment of Repair in Prediction of Dependability. 1147-1162 - Lu-Xing Yang
, Pengdeng Li
, Xiaofan Yang
, Yuan Yan Tang:
A Risk Management Approach to Defending Against the Advanced Persistent Threat. 1163-1172 - Jiayi Chen
, Jianping He
, Lin Cai
, Jianping Pan
:
Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing. 1173-1187 - Liang Zhao
, Liqun Chen
:
Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited. 1188-1206 - Kai He, Jun Guo, Jian Weng
, Jiasi Weng
, Joseph K. Liu
, Xun Yi
:
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data. 1207-1217 - Leo Yu Zhang
, Yifeng Zheng
, Jian Weng
, Cong Wang
, Zihao Shan, Kui Ren:
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center. 1218-1231 - Rekha Govindaraj
, Swaroop Ghosh
, Srinivas Katkoori
:
Design, Analysis and Application of Embedded Resistive RAM Based Strong Arbiter PUF. 1232-1242 - Hui Xu
, Zirui Zhao, Yangfan Zhou, Michael R. Lyu:
Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs. 1243-1256 - Chin-Tser Huang
, Muhammad N. Sakib
, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising. 1257-1268 - Rouzbeh Behnia
, Muslum Ozgur Ozmen
, Attila Altay Yavuz
:
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives. 1269-1282 - Yulai Xie
, Dan Feng, Yuchong Hu
, Yan Li
, Staunton Sample, Darrell D. E. Long
:
Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments. 1283-1296 - Mihai Maruseac
, Gabriel Ghinita
:
Precision-Enhanced Differentially-Private Mining of High-Confidence Association Rules. 1297-1309 - Lin Yao
, Zhenzhen Fan
, Jing Deng
, Xin Fan
, Guowei Wu
:
Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks. 1310-1321 - Xueqiao Liu
, Guomin Yang
, Yi Mu
, Robert H. Deng
:
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage. 1322-1332 - Pierre Bergé
, Jason Crampton, Gregory Z. Gutin
, Rémi Watrigant:
The Authorization Policy Existence Problem. 1333-1344
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.