IEEE Transactions on Dependable and Secure Computing

Title Publication Date Language Citations
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud2014/09/014
Trust-Based Service Management for Social Internet of Things Systems2016/11/014
On the Security of Chien's Ultralightweight RFID Authentication Protocol2011/03/014
A Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things2020/01/014
Industrial Control System Network Intrusion Detection by Telemetry Analysis2016/03/014
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption2016/09/014
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks2015/01/014
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things2020/11/014
Multi-authority Attribute-Based Keyword Search over Encrypted Cloud Data2021/01/014
Searchable Encryption over Feature-Rich Data2018/05/014
Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection2019/01/014
NPMML: A Framework for Non-interactive Privacy-preserving Multi-party Machine Learning2020/01/014
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks2015/05/013
Fast Byzantine Consensus2006/07/013
On the General Applicability of Instruction-Set Randomization2010/07/013
A New Decision-Diagram-Based Method for Efficient Analysis on Multistate Systems2009/07/013
Dependability Evaluation with Dynamic Reliability Block Diagrams and Dynamic Fault Trees2009/01/013
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems2013/07/013
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics2021/01/013
Distributed Detection of Clone Attacks in Wireless Sensor Networks2011/09/013
Revisiting Defenses against Large-Scale Online Password Guessing Attacks2012/01/013
Identity-based fault-tolerant conference key agreement2004/07/01English3
Privacy-Preserving and Byzantine-Robust Federated Learning2024/03/013
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage2020/11/013
Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud2018/01/013
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers2018/01/013
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age2016/01/013
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs2019/03/013
Detection of Repackaged Android Malware with Code-Heterogeneity Features2020/01/013
Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language2020/03/013