Journal: IEEE Trans. Dependable Sec. Comput.

Volume 8, Issue 3

321 -- 336Gang Xu, Cristian Borcea, Liviu Iftode. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
337 -- 352Jianneng Cao, Barbara Carminati, Elena Ferrari, Kian-Lee Tan. CASTLE: Continuously Anonymizing Data Streams
353 -- 362Chia-Wei Lee, Sun-Yuan Hsieh. Determining the Diagnosability of (1, 2)-Matching Composition Networks and Its Applications
363 -- 376Kealan McCusker, Noel E. O Connor. Low-Energy Symmetric Key Distribution in Wireless Sensor Networks
377 -- 390Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao. Modeling and Detection of Camouflaging Worm
391 -- 403Refik Samet. Recovery Device for Real-Time Dual-Redundant Computer Systems
404 -- 418K. K. Rao, James Lee Hafner, Richard A. Golding. Reliability for Networked Storage Nodes
419 -- 433Cyrus Harvesf, Douglas M. Blough. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
434 -- 449Xinyuan Wang, Douglas S. Reeves. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
450 -- 465Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia. Securing Topology Maintenance Protocols for Sensor Networks
466 -- 480Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa. The F_f-Family of Protocols for RFID-Privacy and Authentication