Home
Research Trends
Scientific Articles
Journals
Scientific Journals
Open Access Journals
Journals Search
Contact
Sign Up
Login
Language
English
German
IEEE Transactions on Dependable and Secure Computing
Title
Publication Date
Language
Citations
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud
2014/09/01
4
Trust-Based Service Management for Social Internet of Things Systems
2016/11/01
4
On the Security of Chien's Ultralightweight RFID Authentication Protocol
2011/03/01
4
A Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things
2020/01/01
4
Industrial Control System Network Intrusion Detection by Telemetry Analysis
2016/03/01
4
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption
2016/09/01
4
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
2015/01/01
4
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
2020/11/01
4
Multi-authority Attribute-Based Keyword Search over Encrypted Cloud Data
2021/01/01
4
Searchable Encryption over Feature-Rich Data
2018/05/01
4
Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection
2019/01/01
4
NPMML: A Framework for Non-interactive Privacy-preserving Multi-party Machine Learning
2020/01/01
4
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks
2015/05/01
3
Fast Byzantine Consensus
2006/07/01
3
On the General Applicability of Instruction-Set Randomization
2010/07/01
3
A New Decision-Diagram-Based Method for Efficient Analysis on Multistate Systems
2009/07/01
3
Dependability Evaluation with Dynamic Reliability Block Diagrams and Dynamic Fault Trees
2009/01/01
3
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
2013/07/01
3
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics
2021/01/01
3
Distributed Detection of Clone Attacks in Wireless Sensor Networks
2011/09/01
3
Revisiting Defenses against Large-Scale Online Password Guessing Attacks
2012/01/01
3
Identity-based fault-tolerant conference key agreement
2004/07/01
English
3
Privacy-Preserving and Byzantine-Robust Federated Learning
2024/03/01
3
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage
2020/11/01
3
Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud
2018/01/01
3
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers
2018/01/01
3
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age
2016/01/01
3
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs
2019/03/01
3
Detection of Repackaged Android Malware with Code-Heterogeneity Features
2020/01/01
3
Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language
2020/03/01
3
«
‹ Pervious
Next ›
»