Journal: IEEE Trans. Dependable Sec. Comput.

Volume 16, Issue 6

913 -- 914Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin. Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies
915 -- 929Qi Li 0002, Xiaoyue Zou, Qun Huang, Jing Zheng, Patrick P. C. Lee. Dynamic Packet Forwarding Verification in SDN
930 -- 943Qingjun Chen, Shouqian Shi, Xin Li 0057, Chen Qian 0001, Sheng Zhong. SDN-Based Privacy Preserving Cross Domain Routing
944 -- 956Juan Wang 0006, Ru Wen, Jiangqi Li, Fei Yan, Bo Zhao, Fajiang Yu. Detecting and Mitigating Target Link-Flooding Attacks Using SDN
957 -- 968Wiem Abderrahim, Zièd Choukair. Dependability Integration in Cloud-hosted Telecommunication Services
969 -- 983Anca Jurcut, Tom Coffey, Reiner Dojen. A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks
984 -- 995Sancheng Peng, Guojun Wang 0001, Yongmei Zhou, Cong Wan, Cong Wang 0009, Shui Yu, Jianwei Niu 0002. An Immunization Framework for Social Networks Through Big Data Based Influence Modeling
996 -- 1010Jian Shen 0001, Tianqi Zhou, Debiao He, Yuexin Zhang, Xingming Sun, Yang Xiang 0001. Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing
1011 -- 1025Sandeep Pisharody, Janakarajan Natarajan, Ankur Chowdhary, Abdullah Alshalan, Dijiang Huang. Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments
1026 -- 1039Xiaojing Liao, Preethi Srinivasan, David Formby, Raheem A. Beyah. Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid
1040 -- 1053Song Gao 0010, Manar Mohamed, Nitesh Saxena, Chengcui Zhang. Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures
1054 -- 1069Xiao Han 0001, Hailiang Huang, Leye Wang. F-PAD: Private Attribute Disclosure Risk Estimation in Online Social Networks
1070 -- 1085Giorgos Kappes, Andromachi Hatzieleftheriou, Stergios V. Anastasiadis. Multitenant Access Control for Cloud-Aware Distributed Filesystems
1086 -- 1097Limei Lin, Li Xu 0002, Riqing Chen, Sun-Yuan Hsieh, Dajin Wang. Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks

Volume 16, Issue 5

729 -- 730Raphael C.-W. Phan, Moti Yung. Guest Editor's Introduction: Special Issue on Paradigm Shifts in Cryptographic Engineering
731 -- 742Russell W. F. Lai, Kam-Fung Cheung, Sherman S. M. Chow, Anthony Man-Cho So. Another Look at Anonymous Communication
743 -- 756Myungsun Kim, Hyung Tae Lee, San Ling, Benjamin Hong Meng Tan, Huaxiong Wang. Private Compound Wildcard Queries Using Fully Homomorphic Encryption
757 -- 769Donghoon Chang, Aarushi Goel, Sweta Mishra, Somitra Kumar Sanadhya. Generation of Secure and Reliable Honeywords, Preventing False Detection
770 -- 782Maliheh Shirvanian, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk. Building and Studying a Password Store that Perfectly Hides Passwords from Itself
783 -- 795Georg T. Becker. Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory versus Practice
796 -- 804Margarita Osadchy, Orr Dunkelman. It is All in the System's Parameters: Privacy and Security Issues in Transforming Biometric Raw Data into Binary Strings
805 -- 818Pawel Lorek, Filip Zagórski, Michal Kulis. Strong Stationary Times and its use in Cryptography
819 -- 832Muhammad U. Arshad, Muhamad Felemban, Zahid Pervaiz, Arif Ghafoor, Walid G. Aref. A Privacy Mechanism for Access Controlled Graph Data
833 -- 842Zhenfu Cao, Hongbing Wang, Yunlei Zhao. AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications
843 -- 855Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo. Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points
856 -- 870Domenico Cotroneo, Andrea Paudice, Antonio Pecchia. Empirical Analysis and Validation of Security Alerts Filtering Techniques
871 -- 884Mohamed Mahmoud 0001, Khaled Rabieh, Ahmed B. T. Sherif, Enahoro Oriero, Muhammad Ismail 0001, Erchin Serpedin, Khalid A. Qaraqe. Privacy-Preserving Fine-Grained Data Retrieval Schemes for Mobile Social Networks
885 -- 901Mahmoud Ammar, Bruno Crispo, Bart Jacobs 0002, Danny Hughes 0001, Wilfried Daniels. SμV - The Security MicroVisor: A Formally-Verified Software-Based Security Architecture for the Internet of Things
902 -- 912Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao. Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM

Volume 16, Issue 4

551 -- 564Vasileios Karyotis. A Markov Random Field Framework for Modeling Malware Propagation in Complex Communications Networks
565 -- 579Jonathan Chase, Dusit Niyato, Ping Wang 0001, Sivadon Chaisiri, Ryan K. L. Ko. A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing
580 -- 593Yuichi Sei, Hiroshi Okumura, Takao Takenouchi, Akihiko Ohsuga. Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness
594 -- 607Shouling Ji, Ting Wang 0006, Jianhai Chen, Weiqing Li, Prateek Mittal, Raheem Beyah. De-SAG: On the De-Anonymization of Structure-Attribute Graph Data
608 -- 624Aydin Abadi, Sotirios Terzis, Roberto Metere, Changyu Dong. Efficient Delegated Private Set Intersection on Outsourced Private Datasets
625 -- 634Rui Zhang 0002, Yuting Xiao, Shuzhou Sun, Hui Ma 0002. Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
635 -- 650Guido Lena Cota, Sonia Ben Mokhtar, Gabriele Gianini, Ernesto Damiani, Julia Lawall, Gilles Muller, Lionel Brunie. RACOON++: A Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems
651 -- 664Hamed Farbeh, Fereshte Mozafari, Masoume Zabihi, Seyed Ghassem Miremadi. RAW-Tag: Replicating in Altered Cache Ways for Correcting Multiple-Bit Errors in Tag Array
665 -- 678Chongxi Bao, Ankur Srivastava. Reducing Timing Side-Channel Information Leakage Using 3D Integration
679 -- 692Jianwei Qian, Xiang-Yang Li 0001, Chunhong Zhang, Linlin Chen, Taeho Jung, Junze Han. Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model
693 -- 710Cai Fu, Xiao-Yang Liu, Jia Yang, Laurence T. Yang, Shui Yu, Tianqing Zhu. Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks
711 -- 724Ambra Demontis, Marco Melis, Battista Biggio, Davide Maiorca, Daniel Arp, Konrad Rieck, Igino Corona, Giorgio Giacinto, Fabio Roli. Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
725 -- 728Fang-Yu Rao. On the Security of a Variant of ElGamal Encryption Scheme

Volume 16, Issue 3

373 -- 375Chip-Hong Chang, Marten van Dijk, Ulrich Rührmair, Mark M. Tehranipoor. Emerging Attacks and Solutions for Secure Hardware in the Internet of Things
376 -- 387Ali Akbar Pammu, Kwen-Siong Chong, Yi Wang, Bah-Hwee Gwee. A Highly Efficient Side Channel Attack with Profiling through Relevance-Learning on Physical Leakage Information
388 -- 401Bilgiday Yuce, Chinmay Deshpande, Marjan Ghodrati, Abhishek Bendre, Leyla Nazhandali, Patrick Schaumont. A Secure Exception Mode for Fault-Attack-Resistant Processing
402 -- 414Qian Wang, Gang Qu. A Silicon PUF Based Entropy Pump
415 -- 423Pieter Maene, Johannes Götzfried, Tilo Müller, Ruan de Clercq, Felix C. Freiling, Ingrid Verbauwhede. Atlas: Application Confidentiality in Compromised Embedded Systems
424 -- 437Urbi Chatterjee, Vidya Govindan, Rajat Sadhukhan, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Debashis Mahata, Mukesh M. Prabhu. Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
438 -- 453Le Guan, Chen Cao, Peng Liu 0005, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger. Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM
454 -- 461Wei Li, Linfeng Liao, Dawu Gu, Chaoyun Li, Chenyu Ge, Zheng Guo 0001, Ya Liu 0001, Zhiqiang Liu. Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things
462 -- 475André Schaller, Wenjie Xiong 0001, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Boris Skoric, Stefan Katzenbeisser 0001, Jakub Szefer. Decay-Based DRAM PUFs in Commodity Devices
476 -- 483Huiyun Li, Cuiping Shao, Zheng Wang 0027. Detecting Fault Injection Attacks Based on Compressed Sensing and Integer Linear Programming
484 -- 497Yiran Shen, Hongkai Wen 0001, Chengwen Luo, Weitao Xu, Tao Zhang 0001, Wen Hu, Daniela Rus. GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait
498 -- 510Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann 0001, Sebastian Hoppach, Matthias Wilhelm, Tobias Weidlich, Russell Tessier, Christof Paar. HAL - The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion
511 -- 520Hila Rabii, Yaara Neumeier, Osnat Keren. High Rate Robust Codes with Low Implementation Complexity
521 -- 529Zhe Liu 0001, Hwajeong Seo, Aniello Castiglione, Kim-Kwang Raymond Choo, Howon Kim. Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things
530 -- 545S. Abhishek Anand, Nitesh Saxena. Noisy Vibrational Pairing of IoT Devices

Volume 16, Issue 2

188 -- 203Dimitris Mitropoulos, Panos Louridas, Michalis Polychronakis, Angelos Dennis Keromytis. Defending Against Web Application Attacks: Approaches, Challenges and Implications
204 -- 216Ling Ren 0001, Christopher W. Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas. Design and Implementation of the Ascend Secure Processor
217 -- 230Martine De Cock, Rafael Dowsley, Caleb Horst, Raj S. Katti, Anderson C. A. Nascimento, Wing-Sea Poon, Stacey Truex. Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation
231 -- 244Luis Munoz-Gonzalez, Daniele Sgandurra, Martín Barrère, Emil C. Lupu. Exact Inference Techniques for the Analysis of Bayesian Attack Graphs
245 -- 258Boyang Wang, Ming Li 0003, Li Xiong 0001. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
259 -- 271Dong Xiang, Bing Li, Yi Fu. Fault-Tolerant Adaptive Routing in Dragonfly Networks
272 -- 286Xiao Lan, Jing Xu, Zhen-Feng Zhang, Wen Tao Zhu. Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3
287 -- 300HoJoon Lee, Hyungon Moon, Ingoo Heo, DaeHee Jang, Jinsoo Jang, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang. KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object
301 -- 312Gregory Levitin, Liudong Xing, Yuanshun Dai. Optimal Spot-Checking for Collusion Tolerance in Computer Grids
313 -- 328Gergely Ács, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik, Christopher A. Wood. Privacy-Aware Caching in Information-Centric Networking
329 -- 343Emre Yilmaz, Hakan Ferhatosmanoglu, Erman Ayday, Remzi Can Aksoy. Privacy-Preserving Aggregate Queries for Optimal Location Selection
344 -- 357Xiaofeng Ding, Peng Liu, Hai Jin 0001. Privacy-Preserving Multi-Keyword Top-$k$ k Similarity Search Over Encrypted Data
358 -- 372Ranjan Pal, Leana Golubchik, Konstantinos Psounis, Pan Hui. Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets

Volume 16, Issue 1

1 -- 4Jaideep Vaidya. Editorial
5 -- 17Satyajayant Misra, Reza Tourani, Frank Natividad, Travis Mick, Nahid Ebrahimi Majd, Hong Huang. AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge
18 -- 32Syed Kamran Haider, Chenglu Jin, Masab Ahmad, Devu Manikantan Shila, Omer Khan, Marten van Dijk. Advancing the State-of-the-Art in Hardware Trojans Detection
33 -- 43Erman Ayday, Qiang Tang 0001, Arif Yilmaz. Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
44 -- 57Xiaoguang Wang, Yong Qi, Zhi Wang 0004, Yue Chen, Yajin Zhou. Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems
58 -- 71Aaron S. Pope, Daniel R. Tauritz, Alexander D. Kent. Evolving Bipartite Authentication Graph Partitions
72 -- 83Yannan Li, Yong Yu, Geyong Min, Willy Susilo, Jianbing Ni, Kim-Kwang Raymond Choo. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
84 -- 98Nathalie Baracaldo, Balaji Palanisamy, James Joshi. G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework
99 -- 112Tobias Wüchner, Aleksander Cislak, Martín Ochoa, Alexander Pretschner. Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection
113 -- 126Yingyuan Yang, Jinyuan Sun, Linke Guo. PersonaIA: A Lightweight Implicit Authentication System Based on Customized User Behavior Selection
127 -- 141Yongwang Zhao, David Sanán, Fuyuan Zhang, Yang Liu 0003. Refinement-Based Specification and Security Analysis of Separation Kernels
142 -- 155Tianbo Wang, Chunhe Xia, Sheng Wen, Hui Xue, Yang Xiang 0001, Shouzhong Tu. SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks
156 -- 173Chenglu Jin, Marten van Dijk. Secure and Efficient Initialization and Authentication Protocols for SHIELD
174 -- 187Muffy Calder, Michele Sevegnani. Stochastic Model Checking for Predicting Component Failures and Service Availability