default search action
IEEE Transactions on Dependable and Secure Computing, Volume 3
Volume 3, Number 1, January-March 2006
- Ravishankar K. Iyer:
Editorial: Dependability and Security--Looking Foward to 2006. 1
- André Schiper, Sam Toueg:
From Set Membership to Group Membership: A Separation of Concerns. 2-12 - Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Indrakshi Ray:
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. 13-30 - Konstantinos Xinidis, Ioannis Charitakis, Spyros Antonatos, Kostas G. Anagnostakis, Evangelos P. Markatos:
An Active Splitter Architecture for Intrusion Detection and Prevention. 31-44 - Gal Badishi, Idit Keidar, Amir Sasson:
Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast. 45-61 - Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney:
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. 62-77 - Danny Nebenzahl, Shmuel Sagiv, Avishai Wool:
Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. 78-90 - Shyh-Yih Wang, Chi-Sung Laih:
Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme. 91-100
Volume 3, Number 2, April-June 2006
- Yanjiang Yang, Robert H. Deng, Feng Bao:
A Practical Password-Based Two-Server Authentication and Key Exchange System. 105-114 - Gunjan Khanna, Padma Varadharajan, Saurabh Bagchi:
Automated Online Monitoring of Distributed Applications through External Monitors. 115-129 - Tatsuya Ozaki, Tadashi Dohi, Hiroyuki Okamura, Naoto Kaio:
Distribution-Free Checkpoint Placement Algorithms Based on Min-Max Principle. 130-140 - Yoohwan Kim, Wing Cheong Lau, Mooi Choo Chuah, H. Jonathan Chao:
PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks. 141-155 - Anil L. Pereira, Vineela Muppavarapu, Soon Myoung Chung:
Role-Based Access Control for Grid Database Services Using the Community Authorization Service. 156-166
Volume 3, Number 3, July-September 2006
- Jean Arlat, Andrea Bondavalli, Boudewijn R. Haverkort, Paulo Veríssimo:
Guest Editorial for the Special Issue on the 2005 IEEE/IFIP Conference on Dependable Systems and Networks, including the Dependable Computing and Communications and Performance and Dependability Symposia. 169-171 - Elisabeth A. Strunk, John C. Knight:
Dependability through Assured Reconfiguration in Embedded System Software. 172-187 - Nicholas J. Wang, Sanjay J. Patel:
ReStore: Symptom-Based Soft Error Detection in Microprocessors. 188-201 - Jean-Philippe Martin, Lorenzo Alvisi:
Fast Byzantine Consensus. 202-215 - Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting:
System Call Monitoring Using Authenticated System Calls. 216-229 - Alper Tugay Mizrak, Yuchung Cheng, Keith Marzullo, Stefan Savage:
Detecting and Isolating Malicious Routers. 230-244 - Axel Thümmler, Peter Buchholz, Miklós Telek:
A Novel Approach for Phase-Type Fitting with the EM Algorithm. 245-258 - Peter Kemper, Dennis Müller, Axel Thümmler:
Combining Response Surface Methodology with Numerical Methods for Optimization of Markovian Models. 259-269
Volume 3, Number 4, October-December 2006
- Junghee Han, David Watson, Farnam Jahanian:
An Experimental Study of Internet Path Diversity. 273-288 - Zachary K. Baker, Viktor K. Prasanna:
Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs. 289-300 - Anthony Y. Fu, Liu Wenyin, Xiaotie Deng:
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD). 301-311 - Guofei Jiang, Haifeng Chen, Kenji Yoshihira:
Modeling and Tracking of Transaction Flow Dynamics for Fault Detection in Complex Systems. 312-326 - Angelo Ciaramella, Paolo D'Arco, Alfredo De Santis, Clemente Galdi, Roberto Tagliaferri:
Neural Network Techniques for Proactive Password Checking. 327-339 - Jiangtao Li, Ninghui Li:
OACerts: Oblivious Attribute Certificates. 340-352 - Vilas Sridharan, Hossein Asadi, Mehdi Baradaran Tahoori, David R. Kaeli:
Reducing Data Cache Susceptibility to Soft Errors. 353-364 - Krerk Piromsopa, Richard J. Enbody:
Secure Bit: Transparent, Hardware Buffer-Overflow Protection. 365-376 - Adnan Vora, Mikhail Nesterenko:
Secure Location Verification Using Radio Broadcast. 377-385 - Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang:
Securing Mobile Ad Hoc Networks with Certificateless Public Keys. 386-399
- Jean-Philippe Martin, Lorenzo Alvisi:
Correction to "Fast Byzantine Consensus". 400
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.