Journal: IEEE Trans. Dependable Sec. Comput.

Volume 17, Issue 6

1133 -- 1146Jangirala Srinivas, Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar 0001. Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
1147 -- 1162Jose Ignacio Aizpurua, Yiannis Papadopoulos, Guillaume Merle. Explicit Modelling and Treatment of Repair in Prediction of Dependability
1163 -- 1172Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Yuan Yan Tang. A Risk Management Approach to Defending Against the Advanced Persistent Threat
1173 -- 1187Jiayi Chen, Jianping He, Lin Cai 0001, Jianping Pan 0001. Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing
1188 -- 1206Liang Zhao, Liqun Chen. Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited
1207 -- 1217Kai He, Jun Guo 0001, Jian Weng 0001, Jia-Si Weng, Joseph K. Liu, Xun Yi. Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data
1218 -- 1231Leo Yu Zhang, Yifeng Zheng, Jian Weng 0001, Cong Wang 0001, Zihao Shan, Kui Ren 0001. You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center
1232 -- 1242Rekha Govindaraj, Swaroop Ghosh, Srinivas Katkoori. Design, Analysis and Application of Embedded Resistive RAM Based Strong Arbiter PUF
1243 -- 1256Hui Xu 0009, Zirui Zhao, Yangfan Zhou, Michael R. Lyu. Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs
1257 -- 1268Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla. A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising
1269 -- 1282Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila Altay Yavuz. Lattice-Based Public Key Searchable Encryption from Experimental Perspectives
1283 -- 1296Yulai Xie, Dan Feng 0001, Yuchong Hu, Yan Li, Staunton Sample, Darrell D. E. Long. Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments
1297 -- 1309Mihai Maruseac, Gabriel Ghinita. Precision-Enhanced Differentially-Private Mining of High-Confidence Association Rules
1310 -- 1321Lin Yao, ZhenZhen Fan, Jing Deng 0001, Xin Fan, Guowei Wu. Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks
1322 -- 1332Xueqiao Liu, Guomin Yang, Yi Mu 0001, Robert H. Deng. Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage
1333 -- 1344Pierre Bergé, Jason Crampton, Gregory Z. Gutin, Rémi Watrigant. The Authorization Policy Existence Problem

Volume 17, Issue 5

898 -- 911Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Yang Yang 0026, HweeHwa Pang. Privacy-Preserving Outsourced Calculation Toolkit in the Cloud
912 -- 927Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao. Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
928 -- 941Javier Álvarez Cid-Fuentes, Claudia Szabo, Katrina Falkner. Adaptive Performance Anomaly Detection in Distributed Systems Using Online SVMs
942 -- 956Jangirala Srinivas, Ashok Kumar Das, Neeraj Kumar 0001, Joel J. P. C. Rodrigues. Cloud Centric Authentication for Wearable Healthcare Monitoring System
957 -- 971Dina Kamel, François-Xavier Standaert, Alexandre Duc, Denis Flandre, Francesco Berti. Learning with Physical Noise or Errors
972 -- 983Ziyuan Hu, Shengli Liu, Kefei Chen. Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks
984 -- 999Shujie Cui, Muhammad Rizwan Asghar, Giovanni Russello. Multi-CDN: Towards Privacy in Content Delivery Networks
1000 -- 1014Jinsoo Jang, Brent ByungHoon Kang. Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection
1015 -- 1025Mikhail Dorojevets. Energy-Efficient Superconductor Bloom Filters for Streaming Data Inspection
1026 -- 1038Hui Ma 0002, Rui Zhang 0002, Guomin Yang, Zishuai Song, Kai He, Yuting Xiao. Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices
1039 -- 1050Rachid Guerraoui, Alexandre Maurer. The Cost of Scaling a Reliable Interconnection Topology
1051 -- 1062Jianan Hong, Kaiping Xue, Na Gai, David S. L. Wei, Peilin Hong. Service Outsourcing in F2C Architecture with Attribute-based Anonymous Access Control and Bounded Service Number
1063 -- 1078Wei Song 0003, Qingqing Huang, Jeff Huang 0001. Understanding JavaScript Vulnerabilities in Large Real-World Android Applications
1079 -- 1093Dajiang Chen, Ning Zhang 0007, Nan Cheng, Kuan Zhang, Zhiguang Qin, Xuemin Shen. Physical Layer based Message Authentication with Secure Channel Codes
1094 -- 1108Zeyu Mi, Haibo Chen, Yinqian Zhang, Shuanghe Peng, Xiaofeng Wang 0006, Michael K. Reiter. CPU Elasticity to Mitigate Cross-VM Runtime Monitoring
1109 -- 1123Lu Ou, Zheng Qin, Shaolin Liao, Yuan Hong, Xiaohua Jia. Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy
1124 -- 1132Debiao He, Yudi Zhang 0001, Ding Wang 0002, Kim-Kwang Raymond Choo. Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

Volume 17, Issue 4

676 -- 690Xiaohui Liang, Ronald A. Peterson, David Kotz. Securely Connecting Wearables to Ambient Displays with User Intent
691 -- 702Sai Mounika Errapotu, Hongning Li, Rong Yu, Shaolei Ren, Qingqi Pei, Miao Pan, Zhu Han. Clock Auction Inspired Privacy Preserving Emergency Demand Response in Colocation Data Centers
703 -- 715Liehuang Zhu, Meng Li 0006, Zijian Zhang, Zhan Qin. ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks
716 -- 729Hong Zhao, Luke Kwiat, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla. Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection
730 -- 744Muhammad Shahzad, M. Zubair Shafiq, Alex X. Liu. Large Scale Characterization of Software Vulnerability Life Cycles
745 -- 759Aziz Mohaisen, Zhongshu Gu, Kui Ren 0001, Zhenhua Li 0001, Charles A. Kamhoua, Laurent L. Njilla, DaeHun Nyang. Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation
760 -- 774Yan Zhang 0019, Loukas Lazos. Misbehavior in Multi-Channel MAC Protocols
775 -- 781Andrea Visconti, Federico Gorla. Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2
782 -- 794Jing Li 0036, Peng Li 0026, Rebecca J. Stones, Gang Wang 0001, Zhongwei Li, Xiaoguang Liu. Reliability Equations for Cloud Storage Systems with Proactive Fault Tolerance
795 -- 812Xiaobo Ma, Bo An 0001, Mengchen Zhao, Xiapu Luo, Lei Xue 0001, Zhenhua Li 0001, Tony T. N. Miu, Xiaohong Guan. Randomized Security Patrolling for Link Flooding Attack Detection
813 -- 827Arslan Munir, Farinaz Koushanfar. Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study
828 -- 840Sheng Li 0006, Xinpeng Zhang, Zhenxing Qian, Guorui Feng, Yanli Ren. Key Based Artificial Fingerprint Generation for Privacy Protection
841 -- 856Bert Abrath, Bart Coppens, Mohit Mishra, Jens Van den Broeck, Bjorn De Sutter. $\Delta$ΔBreakpad: Diversified Binary Crash Reporting
857 -- 868Jun Feng 0007, Laurence T. Yang, Qing Zhu, Kim-Kwang Raymond Choo. Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment
869 -- 882Zishan Liu, Zhenyu Liu 0002, Lin Zhang, Xiaodong Lin. MARP: A Distributed MAC Layer Attack Resistant Pseudonym Scheme for VANET
883 -- 897Sungjin Park 0001, Chung Hwan Kim, Junghwan Rhee, Jong-Jin Won, Taisook Han, Dongyan Xu. CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality

Volume 17, Issue 3

451 -- 464Mohammad Ashiqur Rahman, Amarjit Datta. Impact of Stealthy Attacks on Optimal Power Flow: A Simulink-Driven Formal Analysis
465 -- 478P. V. Rajkumar, Ravi Sandhu. Safety Decidability for Pre-Authorization Usage Control with Identifier Attribute Domains
479 -- 492Xiaonan Zhu, Jinku Li, Yajin Zhou, Jianfeng Ma. AdCapsule: Practical Confinement of Advertisements in Android Applications
493 -- 505Igor Kaitovic, Miroslaw Malek. Impact of Failure Prediction on Availability: Modeling and Comparative Analysis of Predictive and Reactive Methods
506 -- 517Masoud Narouei, Hassan Takabi, Rodney Nielsen. Automatic Extraction of Access Control Policies from Natural Language Documents
518 -- 535Peter F. Klemperer, Hye Yoon Jeon, Bryan D. Payne, James C. Hoe. High-Performance Memory Snapshotting for Real-Time, Consistent, Hypervisor-Based Monitors
536 -- 549Zhe Liu 0001, Patrick Longa, Geovandro C. C. F. Pereira, Oscar Reparaz, Hwajeong Seo. Four$\mathbb {Q}$Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks
550 -- 565Neetesh Saxena, Hong Shen, Nikos Komninos, Kim-Kwang Raymond Choo, Narendra S. Chaudhari. BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users
566 -- 580Christian Esposito, Massimo Ficco, Aniello Castiglione, Francesco Palmieri, Alfredo De Santis. Distributed Group Key Management for Event Notification Confidentiality Among Sensors
581 -- 594Jianbing Ni, Kuan Zhang, Yong Yu 0002, Xiaodong Lin, Xuemin Sherman Shen. Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing
595 -- 607Yonggang Huang, Jun Zhang 0010, Lei Pan 0002, Yang Xiang 0001. Privacy Protection in Interactive Content Based Image Retrieval
608 -- 619Yue Zhang, Jia Yu 0005, Rong Hao, Cong Wang 0001, Kui Ren 0001. Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data
620 -- 633Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael B. Abu-Ghazaleh, Dmitry Ponomarev. EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers
634 -- 647Lei Zhang 0009, Xinyu Meng, Kim-Kwang Raymond Choo, Yuanfei Zhang, Feifei Dai. Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud
648 -- 661An Wang 0002, Wentao Chang, Songqing Chen, Aziz Mohaisen. A Data-Driven Study of DDoS Attacks and Their Dynamics
662 -- 675Antonio Montieri, Domenico Ciuonzo, Giuseppe Aceto, Antonio Pescapè. Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)

Volume 17, Issue 2

222 -- 235Boxiang Dong, Hui Wang 0013, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo. Authenticated Outlier Mining for Outsourced Databases
236 -- 247Zhikun Zhang, Heng Zhang 0001, Shibo He, Peng Cheng 0001. Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks
248 -- 261Zhirong Shen, Patrick P. C. Lee, Jiwu Shu, Wenzhong Guo. Cross-Rack-Aware Single Failure Recovery for Clustered File Systems
262 -- 277Tanmoy Chakraborty 0002, Fabio Pierazzi, V. S. Subrahmanian. EC2: Ensemble Clustering and Classification for Predicting Android Malware Families
278 -- 291Andreas Walz, Axel Sikora. Exploiting Dissent: Towards Fuzzing-Based Differential Black-Box Testing of TLS Implementations
292 -- 305Keita Emura, Takuya Hayashi 0001, Ai Ishida. Group Signatures with Time-Bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation
306 -- 319Li Lu 0001, Lingshuang Liu, Muhammad Jawad Hussain, Yongshuai Liu. I Sense You by Breath: Speaker Recognition via Breath Biometrics
320 -- 334Yang Yang 0026, Ximeng Liu, Robert H. Deng. Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language
335 -- 349Chao Shen 0001, Yufei Chen, Xiaohong Guan, Roy A. Maxion. Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System
350 -- 362Huaxin Li, Qingrong Chen, Haojin Zhu, Di Ma, Hong Wen, Xuemin Sherman Shen. Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks
363 -- 376Wenxiu Ding, Zheng Yan 0002, Robert H. Deng. Privacy-Preserving Data Processing with Flexible Access Control
377 -- 390Luigi Catuogno, Clemente Galdi, Giuseppe Persiano. Secure Dependency Enforcement in Package Management Systems
391 -- 406Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar 0001, Willy Susilo. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
407 -- 421Weili Han, Chang Cao, Hao Chen 0003, Dong Li, Zheran Fang, Wenyuan Xu, X. Sean Wang. senDroid: Auditing Sensor Access in Android System-Wide
422 -- 435Nahid Juma, Jonathan Shahen, Khalid Zaman Bijon, Mahesh Tripunitara. The Overhead from Combating Side-Channels in Cloud Systems Using VM-Scheduling
436 -- 442Tara Merin John, Syed Kamran Haider, Hamza Omar, Marten van Dijk. Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory
443 -- 450Emre Kaplan, Mehmet Emre Gursoy, Mehmet Ercan Nergiz, Yücel Saygin. Known Sample Attacks on Relation Preserving Data Transformations

Volume 17, Issue 1

1 -- 0Jaideep Vaidya. Editorial
2 -- 21Andrea De Salve, Roberto Di Pietro, Paolo Mori, Laura Ricci. A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks
22 -- 34Eyal Itkin, Avishai Wool. A Security Analysis and Revised Security Extension for the Precision Time Protocol
35 -- 49Jeroen Van Cleemput, Bjorn De Sutter, Koen De Bosschere. Adaptive Compiler Strategies for Mitigating Timing Side Channel Attacks
51 -- 64Wenyuan Xu, Jing Tian, Yu Cao, Song Wang 0002. Challenge-Response Authentication Using In-Air Handwriting Style Verification
64 -- 77Ke Tian, Danfeng Yao, Barbara G. Ryder, Gang Tan, Guojun Peng. Detection of Repackaged Android Malware with Code-Heterogeneity Features
78 -- 91Yang Yang 0026, Ximeng Liu, Robert H. Deng, Yingjiu Li. Lightweight Sharable and Traceable Secure Mobile Health System
92 -- 105Zheng Zheng 0001, Kishor S. Trivedi, Nan Wang, Kun Qiu. Markov Regenerative Models of WebServers for Their User-Perceived Availability and Bottlenecks
106 -- 120Yanjun Pan, Yantian Hou, Ming Li 0003, Ryan M. Gerdes, Kai Zeng 0001, Md. Asaduzzaman Towfiq, Bedri A. Cetiner. Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization
121 -- 133Yifeng Zheng, Huayi Duan, Xingliang Yuan, Cong Wang 0001. Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery
134 -- 147Pilar Holgado, Víctor A. Villagrá, Luis Vázquez. Real-Time Multistep Attack Prediction Based on Hidden Markov Models
148 -- 161Suhrid Satyal, Ingo Weber, Len Bass, Min Fu 0001. Rollback Mechanisms for Cloud Management APIs Using AI Planning
162 -- 178Yuan Zhang 0004, Boyu Zhu, Yixin Fang, Suxin Guo, Aidong Zhang, Sheng Zhong. Secure Inter-Domain Forwarding Loop Test in Software Defined Networks
179 -- 193Linzhi Jiang, Chunxiang Xu, Xiaofang Wang, Bo Luo, Huaqun Wang. Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain
194 -- 207Ali Inan, Mehmet Emre Gursoy, Yücel Saygin. Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms
209 -- 222Wei You, Bin Liang 0002, Wenchang Shi, Peng Wang, Xiangyu Zhang 0001. TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices