Home
Research Trends
Scientific Articles
Journals
Scientific Journals
Open Access Journals
Journals Search
Contact
Sign Up
Login
Language
English
German
IEEE Transactions on Dependable and Secure Computing
Title
Publication Date
Language
Citations
Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams
2018/09/01
24
Basic concepts and taxonomy of dependable and secure computing
2004/01/01
English
23
Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices
2020/01/01
22
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
2016/01/01
22
Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks
2016/01/01
17
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive
2019/01/01
17
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features
2021/01/01
13
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
2021/03/01
10
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention
2018/01/01
10
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity
2007/10/01
9
Credit Card Fraud Detection Using Hidden Markov Model
2008/01/01
9
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks
2022/01/01
9
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment
2018/09/01
9
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data
2016/05/01
8
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection
2022/01/01
7
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
2020/03/01
7
A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code
2015/07/01
7
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
2022/07/01
7
Dynamic Security Risk Management Using Bayesian Attack Graphs
2012/01/01
7
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
2012/11/01
6
μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
2019/01/01
6
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
2021/05/01
6
A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet
2018/01/01
6
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense
2018/07/01
6
Towards Detecting Compromised Accounts on Social Networks
2017/07/01
6
SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems
2012/03/01
6
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
2021/05/01
5
Malware Detection in Cloud Computing Infrastructures
2016/03/01
5
Hiding in the Mobile Crowd: LocationPrivacy through Collaboration
2014/05/01
5
Robust Multi-Factor Authentication for Fragile Communications
2014/11/01
5
«
‹ Pervious
Next ›
»