default search action
IEEE Transactions on Dependable and Secure Computing, Volume 5
Volume 5, Number 1, January-March 2008
- Tsz-Yeung Wong, Man Hon Wong, John C. S. Lui:
A Precise Termination Condition of the Probabilistic Packet Marking Algorithm. 6-21 - Zhenhai Duan, Xin Yuan, Jaideep Chandrashekar:
Controlling IP Spoofing through Interdomain Packet Filters. 22-36 - Abhinav Srivastava, Amlan Kundu, Shamik Sural, Arun K. Majumdar:
Credit Card Fraud Detection Using Hidden Markov Model. 37-48 - Mahalingam Ramkumar:
Trustworthy Computing under Resource Constraints with the DOWN Policy. 49-61
Volume 5, Number 2, April-June
- Elisa Bertino, Ning Shang, Samuel S. Wagstaff Jr.:
An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting. 65-70 - Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi:
Modeling and Automated Containment of Worms. 71-86 - Haibing Lu, Yingjiu Li:
Practical Inference Control for Data Cubes. 87-98 - Roman Obermaisser:
Temporal Partitioning of Communication Resources in an Integrated Architecture. 99-114 - Suresh Srinivasan, Krishnan Ramakrishnan, Prasanth Mangalagiri, Yuan Xie, Vijaykrishnan Narayanan, Mary Jane Irwin, Karthik Sarpatwari:
Toward Increasing FPGA Lifetime. 115-127
Volume 5, Number 3, July - September 2008
- Spyros T. Halkidis, Nikolaos Tsantalis, Alexander Chatzigeorgiou, George Stephanides:
Architectural Risk Analysis of Software Systems Based on Security Patterns. 129-142 - Jong-Tae Park, Jae-Wook Nah, Wee-Hyuk Lee:
Dynamic Path Management with Resilience Constraints under Multiple Link Failures in MPLS/GMPLS Networks. 143-154 - Jian Ren, Lein Harn:
Generalized Ring Signatures. 155-163 - Francesco Menichelli, Renato Menicocci, Mauro Olivieri, Alessandro Trifiletti:
High-Level Side-Channel Attack Modeling and Simulation for Security-Critical Systems on Chips. 164-176 - Jing Deng, Yunghsiang S. Han:
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission. 177-190
Volume 5, Number 4, October - December 2008
- Bruno Blanchet:
A Computationally Sound Mechanized Prover for Security Protocols. 193-207 - Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani B. Srivastava:
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels. 208-223 - David Brumley, James Newsome, Dawn Song, Hao Wang, Somesh Jha:
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. 224-241 - Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough:
Towards Formal Verification of Role-Based Access Control Policies. 242-255
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.