Journal: IEEE Trans. Dependable Sec. Comput.

Volume 17, Issue 6

1133 -- 1146Jangirala Srinivas, Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar 0001. Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
1147 -- 1162Jose Ignacio Aizpurua, Yiannis Papadopoulos, Guillaume Merle. Explicit Modelling and Treatment of Repair in Prediction of Dependability
1163 -- 1172Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Yuan Yan Tang. A Risk Management Approach to Defending Against the Advanced Persistent Threat
1173 -- 1187Jiayi Chen, Jianping He, Lin Cai 0001, Jianping Pan 0001. Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing
1188 -- 1206Liang Zhao, Liqun Chen. Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited
1207 -- 1217Kai He, Jun Guo 0001, Jian Weng 0001, Jia-Si Weng, Joseph K. Liu, Xun Yi. Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data
1218 -- 1231Leo Yu Zhang, Yifeng Zheng, Jian Weng 0001, Cong Wang 0001, Zihao Shan, Kui Ren 0001. You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center
1232 -- 1242Rekha Govindaraj, Swaroop Ghosh, Srinivas Katkoori. Design, Analysis and Application of Embedded Resistive RAM Based Strong Arbiter PUF
1243 -- 1256Hui Xu 0009, Zirui Zhao, Yangfan Zhou, Michael R. Lyu. Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs
1257 -- 1268Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla. A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising
1269 -- 1282Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila Altay Yavuz. Lattice-Based Public Key Searchable Encryption from Experimental Perspectives
1283 -- 1296Yulai Xie, Dan Feng 0001, Yuchong Hu, Yan Li, Staunton Sample, Darrell D. E. Long. Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments
1297 -- 1309Mihai Maruseac, Gabriel Ghinita. Precision-Enhanced Differentially-Private Mining of High-Confidence Association Rules
1310 -- 1321Lin Yao, ZhenZhen Fan, Jing Deng 0001, Xin Fan, Guowei Wu. Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks
1322 -- 1332Xueqiao Liu, Guomin Yang, Yi Mu 0001, Robert H. Deng. Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage
1333 -- 1344Pierre Bergé, Jason Crampton, Gregory Z. Gutin, Rémi Watrigant. The Authorization Policy Existence Problem