Journal: IEEE Trans. Dependable Sec. Comput.

Volume 14, Issue 6

577 -- 0Elisa Bertino. Editor's Note
578 -- 590Peng Zhang, Qi Li, Patrick P. C. Lee. Achieving Content-Oriented Anonymity with CRISP
591 -- 604Pietro Colombo, Elena Ferrari. Enhancing MongoDB with Purpose-Based Access Control
605 -- 619Reza Azarderakhsh, Dieter Fishbein, Gurleen Grewal, Shi Hu, David Jao, Patrick Longa, Rajeev Verma. Fast Software Implementations of Bilinear Pairings
620 -- 632George Bissias, Brian Neil Levine, Marc Liberatore, Swagatika Prusty. Forensic Identification of Anonymous Sources in OneSwarm
633 -- 649Alptekin Küpçü. Incentivized Outsourced Computation Resistant to Malicious Contractors
650 -- 663Zequ Yang, Peng Cheng, Jiming Chen. Learning-Based Jamming Attack against Low-Duty-Cycle Networks
664 -- 678Marco Bonola, Giuseppe Bianchi, Giulio Picierro, Salvatore Pontarelli, Marco Monaci. StreaMon: A Data-Plane Programming Abstraction for Software-Defined Stream Monitoring
679 -- 692Hui Ma 0002, Rui Zhang, Zhiguo Wan, Yao Lu, Suqing Lin. Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
693 -- 694Marc Joye. Cryptanalysis of a Privacy-Preserving Aggregation Protocol

Volume 14, Issue 5

463 -- 477Slawomir Goryczka, Li Xiong 0001. A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy
478 -- 493Basit Shafiq, Sameera Ghayyur, Ammar Masood, Zahid Pervaiz, Abdulrahman Almutairi, M. Farrukh Khan, Arif Ghafoor. Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment
494 -- 506Qi Li, Ravi Sandhu, Xinwen Zhang, Mingwei Xu. Mandatory Content Access Control for Privacy Protection in Information Centric Networks
507 -- 520Ji Zhang, Hongzhou Li, Xuemei Liu, Yonglong Luo, Fulong Chen, Hua Wang, Liang Chang. On Efficient and Robust Anonymization for Privacy Protection on Massive Streaming Categorical Information
521 -- 534Polina Zilberman, Rami Puzis, Yuval Elovici. On Network Footprint of Traffic Inspection and Filtering at Global Scrubbing Centers
535 -- 549Yacin Nadji, Roberto Perdisci, Manos Antonakakis. Still Beheading Hydras: Botnet Takedowns Then and Now
550 -- 564Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, Raheem A. Beyah. Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords
565 -- 572Tassos Dimitriou, Ghassan O. Karame. Enabling Anonymous Authorization and Rewarding in the Smart Grid
573 -- 576SeongHan Shin, Kazukuni Kobara. Security Analysis of Password-Authenticated Key Retrieval

Volume 14, Issue 4

350 -- 362Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng. A Secure, Usable, and Transparent Middleware for Permission Managers on Android
363 -- 376Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu 0001, Jiannong Cao, Xuefeng Liu, Tian Wang. Dependable Structural Health Monitoring Using Wireless Sensor Networks
377 -- 391Hongbo Liu, Yingying Chen, Mooi Choo Chuah, Jie Yang 0003, H. Vincent Poor. Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching
392 -- 405Marco Tiloca, Domenico De Guglielmo, Gianluca Dini, Giuseppe Anastasi, Sajal K. Das. JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs
406 -- 419Yao Zheng, Ming Li, Wenjing Lou, Y. Thomas Hou. Location Based Handshake and Private Proximity Test with Location Tags
420 -- 432Khaled Rabieh, Mohamed M. E. A. Mahmoud, Kemal Akkaya, Samet Tonyali. Scalable Certificate Revocation Schemes for Smart Grid AMI Networks Using Bloom Filters
433 -- 446Brian Krupp, Nigamanth Sridhar, Wenbing Zhao 0001. SPE: Security and Privacy Enhancement Framework for Mobile Devices
447 -- 460Manuel Egele, Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna. Towards Detecting Compromised Accounts on Social Networks
461 -- 462Hu Xiong, Jianfei Sun. Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing"

Volume 14, Issue 3

235 -- 236Kim-Kwang Raymond Choo, Mehran Mozaffari Kermani, Reza Azarderakhsh, Manimaran Govindarasu. Emerging Embedded and Cyber Physical System Security Challenges and Innovations
237 -- 248Zhe Liu 0001, Xinyi Huang, Zhi Hu, Muhammad Khurram Khan, Hwajeong Seo, Lu Zhou. On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age
249 -- 264Fahimeh Rezaei, Michael Hempel, Hamid Sharif. Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic
265 -- 278Ujjwal Guin, Swarup Bhunia, Domenic Forte, Mark Mohammad Tehranipoor. SMA: A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware
279 -- 293Vittorio P. Illiano, Luis Muñoz-González, Emil C. Lupu. Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks
294 -- 307Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong. A Traceback Attack on Freenet
308 -- 325Raphaël Barazzutti, Pascal Felber, Hugues Mercier, Emanuel Onica, Etienne Riviere. Efficient and Confidentiality-Preserving Content-Based Publish/Subscribe with Prefiltering
326 -- 338Yogachandran Rahulamathavan, Muttukrishnan Rajarajan. Efficient Privacy-Preserving Facial Expression Classification
339 -- 349Ehab S. Elmallah, Mohamed G. Gouda. Hardness of Firewall Analysis

Volume 14, Issue 2

116 -- 129Adel El-Atawy, Qi Duan, Ehab Al-Shaer. A Novel Class of Robust Covert Channels Using Out-of-Order Packets
130 -- 144AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot. CPV: Delay-Based Location Verification for the Internet
145 -- 157Hyungon Moon, HoJoon Lee, Ingoo Heo, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang. Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping
158 -- 171Andrei Homescu, Todd Jackson, Stephen Crane, Stefan Brunthaler, Per Larsen, Michael Franz. Large-Scale Automated Software Diversity - Program Evolution Redux
172 -- 184James W. Anderson, Hein Meling, Alexander Rasmussen, Amin Vahdat, Keith Marzullo. Local Recovery for High Availability in Strongly Consistent Cloud Services
185 -- 198Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia. cloud-Tree: Authenticated Index for Verifiable Cloud Service Selection
199 -- 210Kaihe Xu, Yuanxiong Guo, Linke Guo, Yuguang Fang, Xiaolin Li 0001. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
211 -- 220Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan. Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices
221 -- 234Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer, Mohamed Shehab. Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids

Volume 14, Issue 1

1 -- 0Elisa Bertino. The State of the Journal Editorial
2 -- 8Hossein Pilaram, Taraneh Eghlidos. An Efficient Lattice Based Multi-Stage Secret Sharing Scheme
9 -- 21Yuan Zhang, Qingjun Chen, Sheng Zhong. kth Min Computations in Mobile Sensing Systems
22 -- 36Christoph Borchert, Horst Schirmeier, Olaf Spinczyk. Generic Soft-Error Detection and Correction for Concurrent Data Structures
37 -- 49Wooguil Pak, Young-June Choi. High Performance and High Scalable Packet Classification Algorithm for Network Security Systems
50 -- 64Javier Cámara, Rogério de Lemos, Nuno Laranjeiro, Rafael Ventura, Marco Vieira. Robustness-Driven Resilience Evaluation of Self-Adaptive Software Systems
65 -- 82Charles Herder, Ling Ren, Marten van Dijk, Meng-Day Mandel Yu, Srinivas Devadas. Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions
83 -- 94Chunhua Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, Xinyi Huang. Universally Composable RFID Mutual Authentication
95 -- 108Yi Han, Jeffrey Chan, Tansu Alpcan, Christopher Leckie. Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing