Journal: IEEE Trans. Dependable Sec. Comput.

Volume 13, Issue 6

605 -- 616Lingjun Li, Xinxin Zhao, Guoliang Xue. A Proximity Authentication System for Smartphones
617 -- 629Feng Hao, Dylan Clarke, Avelino Francisco Zorzo. Deleting Secret Data with Public Verifiability
630 -- 643Barbara Carminati, Elena Ferrari, Michele Guglielmi. Detection of Unspecified Emergencies for Controlled Information Sharing
644 -- 656Gregory Levitin, Liudong Xing, Qingqing Zhai, Yuanshun Dai. Optimization of Full versus Incremental Periodic Backup Policy
657 -- 671Min-Te Sun, Kazuya Sakai, Wei-Shinn Ku, Ten-Hwang Lai, Athanasios V. Vasilakos. Private and Secure Tag Access for Large-Scale RFID Systems
672 -- 683Yuchang Mo, Liudong Xing, Farong Zhong, Zhao Zhang. Reliability Evaluation of Network Systems with Dependent Propagated Failures Using Decision Diagrams
684 -- 696Ing-Ray Chen, Fenye Bao, Jia Guo. Trust-Based Service Management for Social Internet of Things Systems

Volume 13, Issue 5

509 -- 518Ali Fattaholmanan, Hamid R. Rabiee. A Large-Scale Active Measurement Study on the Effectiveness of Piece-Attack on BitTorrent Networks
519 -- 532Kerem Kaynar, Fikret Sivrikaya. Distributed Attack Graph Generation
533 -- 546Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, Jian Weng. Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption
547 -- 558Yang Liu, Wenji Chen, Yong Guan. Identifying High-Cardinality Hosts from Network-Wide Traffic Measurements
559 -- 567Zhijun Wu, Liyuan Zhang, Meng Yue. Low-Rate DoS Attacks Detection Based on Network Multifractal
568 -- 581Chi-Wei Wang, Chia-Wei Wang, Shiuhpyng Shieh. ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction
582 -- 590P. V. Rajkumar, Ravi Sandhu. Safety Decidability for Pre-Authorization Usage Control with Finite Attribute Domains
591 -- 604Bharath K. Samanthula, Wei Jiang. Secure Multiset Intersection Cardinality and its Application to Jaccard Coefficient

Volume 13, Issue 4

409 -- 410Elisa Bertino, Dario Catalano, Qi Li, Alex X. Liu, Anna Cinzia Squicciarini, Alexey Vinel. Editor's Note
411 -- 423Lianshan Sun, Jaehong Park, Dang Nguyen 0001, Ravi S. Sandhu. A Provenance-Aware Access Control Framework with Typed Provenance
424 -- 436Yuan Cheng, Jaehong Park, Ravi S. Sandhu. An Access Control Model for Online Social Networks Using User-to-User Relationships
437 -- 450Stijn Volckaert, Bart Coppens, Bjorn De Sutter. Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution
451 -- 460Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci. Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes
461 -- 473Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu 0002, Nan Zhang 0004, Kui Ren, Xinwen Fu. Password Extraction via Reconstructed Wireless Mouse Trajectory
474 -- 487Hussain M. J. Almohri, Layne T. Watson, Danfeng Yao, Xinming Ou. Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
488 -- 501Zhi Yang, Jilong Xue, Xiaoyong Yang, Xiao Wang, Yafei Dai. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
502 -- 508Antonio Martínez-Álvarez, Felipe Restrepo-Calle, Sergio Cuenca-Asensi, Leonardo M. Reyneri, Almudena Lindoso, Luis Entrena. A Hardware-Software Approach for On-Line Soft Error Mitigation in Interrupt-Driven Applications

Volume 13, Issue 3

312 -- 325Hongwei Li, Yi Yang, Tom H. Luan, Xiaohui Liang, Liang Zhou, Xuemin Sherman Shen. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data
326 -- 339Shaoquan Jiang. Group Key Agreement with Local Connectivity
340 -- 354Jonghyuk Song, Sangho Lee, Jong Kim. Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata
355 -- 368Srikar Tati, Scott Rager, Bongjun Ko, Guohong Cao, Ananthram Swami, Thomas F. La Porta. netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks
369 -- 380Xun Yi, Athman Bouguettaya, Dimitrios Georgakopoulos, Andy Song, Jan Willemson. Privacy Protection for Wireless Medical Sensor Data
381 -- 393Hui Shen, Ram Krishnan, Rocky Slavin, Jianwei Niu. Sequence Diagram Aided Privacy Policy Specification
394 -- 408Song Fang, Yao Liu, Peng Ning. Wireless Communications under Broadband Reactive Jamming Attacks

Volume 13, Issue 2

146 -- 147Wojciech Mazurczyk, Thomas Holt, Krzysztof Szczypiorski. Guest Editors' Introduction: Special Issue on Cyber Crime
148 -- 162Shams Zawoad, Amit Kumar Dutta, Ragib Hasan. Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service
163 -- 177Jin B. Hong, Dong Seong Kim. Assessing the Effectiveness of Moving Target Defenses Using Security Models
178 -- 191Michael Backes 0001, Niklas Grimm, Aniket Kate. Data Lineage in Malicious Environments
192 -- 205Michael R. Watson, Noor-ul-Hassan Shirazi, Angelos K. Marnerides, Andreas Mauthe, David Hutchison. Malware Detection in Cloud Computing Infrastructures
206 -- 219Marie Vasek, John Wadleigh, Tyler Moore. Hacking Is Not Random: A Case-Control Study of Webserver-Compromise Risk
220 -- 235Yang Liu, Shiyan Hu, Tsung-Yi Ho. Leveraging Strategic Detection Techniques for Smart Home Pricing Cyberattacks
236 -- 251Aditya K. Sood, Sherali Zeadally, Richard J. Enbody. An Empirical Study of HTTP-based Financial Botnets
252 -- 260Stanislav Ponomarev, Travis Atkison. Industrial Control System Network Intrusion Detection by Telemetry Analysis
261 -- 273Markus Riek, Rainer Böhme, Tyler Moore. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
274 -- 283Pradhumna Lai Shrestha, Michael Hempel, Fahimeh Rezaei, Hamid Sharif. A Support Vector Machine-Based Framework for Detection of Covert Timing Channels
284 -- 295Imran Erguler. Achieving Flatness: Selecting the Honeywords from Existing User Passwords
296 -- 311Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini. FRoDO: Fraud Resilient Device for Off-Line Micro-Payments

Volume 13, Issue 1

1 -- 0Elisa Bertino. The State of the Journal Editorial
2 -- 4Alexey V. Vinel, Xiaomin Ma, Dijiang Huang. Guest Editors' Introduction: Special Issue on Reliable and Secure VANETs
5 -- 17Che-Yu Chang, Hsu-Chun Yen, Der-Jiunn Deng. V2V QoS Guaranteed Channel Access in IEEE 802.11p VANETs
18 -- 31Bernhard Kloiber, Jérôme Haäri, Thomas Strang, Stephan Sand, Cristina Rico Garcia. Random Transmit Power Control for DSRC and its Application to Cooperative Safety
32 -- 45Mahmoud Hashem Eiza, Thomas Owens, Qiang Ni. Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs
46 -- 58Pedro J. Fernandez, José Santa, Fernando Bernal-Hidalgo, Antonio F. Skarmeta. Securing Vehicular IPv6 Communications
59 -- 70Xin-Lin Huang, Jun Wu, Wenfeng Li, Zhifeng Zhang, Fusheng Zhu, Minghao Wu. Historical Spectrum Sensing Data Mining for Cognitive Radio Enabled Vehicular Ad-Hoc Networks
71 -- 83Chen Lyu, Dawu Gu, Yunze Zeng, Prasant Mohapatra. PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications
84 -- 92Wei Li, Wenwen Zhang, Dawu Gu, Yanqin Cao, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu. Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks
93 -- 105Rong Yu, Jiawen Kang, Xumin Huang, Shengli Xie, Yan Zhang, Stein Gjessing. MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks
106 -- 119Hassan Artail, Noor Abbani. A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks
120 -- 132Julian Timpner, Dominik Schürmann, Lars C. Wolf. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
133 -- 145Neeraj Kumar, Sudip Misra, Naveen K. Chilamkurti, Jong-Hyouk Lee, Joel J. P. C. Rodrigues. Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment