Home
Research Trends
Scientific Articles
Journals
Scientific Journals
Open Access Journals
Journals Search
Contact
Sign Up
Login
Language
English
German
IEEE Transactions on Dependable and Secure Computing
Title
Publication Date
Language
Citations
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)
2020/05/01
3
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure
2018/05/01
3
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation
2019/03/01
3
AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge
2019/01/01
3
Multi-CDN: Towards Privacy in Content Delivery Networks
2020/09/01
3
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation
2020/01/01
3
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability
2021/03/01
3
LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue
2022/01/01
3
Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data
2022/07/01
3
A Privacy-Preserving and Reputation-Based Truth Discovery Framework in Mobile Crowdsensing
2023/11/01
2
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds
2024/03/01
2
Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage
2024/01/01
2
Subnetwork-Lossless Robust Watermarking for Hostile Theft Attacks in Deep Transfer Learning Models
2024/01/01
2
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments
2023/09/01
2
Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning
2023/09/01
2
Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
2015/01/01
2
Extending the Agile Development Process to Develop Acceptably Secure Software
2014/11/01
2
Comment on “Remote Physical Device Fingerprinting”
2014/09/01
2
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
2014/03/01
2
Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
2015/09/01
2
Analysis of Computer Intrusions Using Sequences of Function Calls
2007/04/01
2
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives
2020/11/01
2
Detecting and Mitigating Target Link-Flooding Attacks Using SDN
2019/11/01
2
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models
2022/05/01
2
A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing
2022/07/01
2
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks
2021/01/01
2
Dynamic Group-Oriented Provable Data Possession in the Cloud
2021/01/01
2
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services
2021/07/01
2
Sensitive Label Privacy Preservation with Anatomization for Data Publishing
2021/03/01
2
The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants
2019/01/01
2
«
‹ Pervious
Next ›
»