Journal: IEEE Trans. Dependable Sec. Comput.

Volume 4, Issue 4

245 -- 251Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti. A Dynamic and Differential CMOS Lookup Table with Data-Independent Power Consumption for Cryptographic Applications on Chip Cards
252 -- 265Xiaoxin Wu, Elisa Bertino. An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks
266 -- 279Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel P. Correia, Paulo Veríssimo. Automated Rule-Based Diagnosis through a Distributed Monitor System
280 -- 294Ilir Gashi, Peter T. Popov, Lorenzo Strigini. Fault Tolerance via Diversity for Off-the-Shelf Products: A Study with SQL Database Servers
295 -- 312Marco Serafini, Andrea Bondavalli, Neeraj Suri. Online Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters
313 -- 324Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi. Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks
325 -- 336Jeremy Lee, Mohammad Tehranipoor, Chintan Patel, Jim Plusquellic. Securing Designs against Scan-Based Side-Channel Attacks
337 -- 340Hung-Yu Chien. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity

Volume 4, Issue 3

165 -- 179Ahmed Awad E. Ahmed, Issa Traoré. A New Biometric Technology Based on Mouse Dynamics
180 -- 190Baruch Awerbuch, Shay Kutten, Yishay Mansour, Boaz Patt-Shamir, George Varghese. A Time-Optimal Self-Stabilizing Synchronizer Using A Phase Clock
191 -- 204Gal Badishi, Amir Herzberg, Idit Keidar. Keeping Denial-of-Service Attackers in the Dark
205 -- 215Nizar Bouabdallah, Bruno Sericola. Introducing a Relative Priority for the Shared-Protection Schemes
216 -- 227Iliano Cervesato, Catherine Meadows. One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements
228 -- 242Wei Yu, Yan Lindsay Sun, K. J. Ray Liu. Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes

Volume 4, Issue 2

85 -- 87Ravishankar K. Iyer. Editorial: Dependability and Security
88 -- 104Min Cai, Kai Hwang, Jianping Pan, Christos Papadopoulos. WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation
105 -- 118Cliff Changchun Zou, Donald F. Towsley, Weibo Gong. Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms
119 -- 136Ram Dantu, João W. Cangussu, Sudeep Patwardhan. Fast Worm Containment Using Feedback Control
137 -- 150Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo. Analysis of Computer Intrusions Using Sequences of Function Calls
151 -- 164Ian Reay, Patricia Beatty, Scott Dick, James Miller. A Survey and Analysis of the P3P Protocol s Agents, Adoption, Maintenance, and Future

Volume 4, Issue 1

1 -- 17HariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders. A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution
18 -- 31Sérgio Gorender, Raimundo José de Araújo Macêdo, Michel Raynal. An Adaptive Programming Model for Fault-Tolerant Distributed Computing
32 -- 40Swapna S. Gokhale. Architecture-Based Software Reliability Analysis: Overview and Limitations
41 -- 55Kai Hwang, Min Cai, Ying Chen, Min Qin. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
56 -- 70Antoine Scherrer, Nicolas Larrieu, Philippe Owezarski, Pierre Borgnat, Patrice Abry. Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies
71 -- 80Tzonelih Hwang, Kuo-Chang Lee, Chuan-Ming Li. Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols