Journal: IEEE Trans. Dependable Sec. Comput.

Volume 5, Issue 4

193 -- 207Bruno Blanchet. A Computationally Sound Mechanized Prover for Security Protocols
208 -- 223Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani B. Srivastava. Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
224 -- 241David Brumley, James Newsome, D. Song, Hao Wang, Somesh Jha. Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures
242 -- 255S. Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough. Towards Formal Verification of Role-Based Access Control Policies

Volume 5, Issue 3

129 -- 142Spyros T. Halkidis, Nikolaos Tsantalis, Alexander Chatzigeorgiou, George Stephanides. Architectural Risk Analysis of Software Systems Based on Security Patterns
143 -- 154Jong-Tae Park, Jae-Wook Nah, Wee-Hyuk Lee. Dynamic Path Management with Resilience Constraints under Multiple Link Failures in MPLS/GMPLS Networks
155 -- 163Jian Ren, Lein Harn. Generalized Ring Signatures
164 -- 176Francesco Menichelli, Renato Menicocci, Mauro Olivieri, Alessandro Trifiletti. High-Level Side-Channel Attack Modeling and Simulation for Security-Critical Systems on Chips
177 -- 190Jing Deng, Yunghsiang S. Han. Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission

Volume 5, Issue 2

65 -- 70Elisa Bertino, Ning Shang, Samuel S. Wagstaff Jr.. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting
71 -- 86Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi. Modeling and Automated Containment of Worms
87 -- 98Haibing Lu, Yingjiu Li. Practical Inference Control for Data Cubes
99 -- 114Roman Obermaisser. Temporal Partitioning of Communication Resources in an Integrated Architecture
115 -- 127Suresh Srinivasan, Krishnan Ramakrishnan, Prasanth Mangalagiri, Yuan Xie, Vijaykrishnan Narayanan, Mary Jane Irwin, Karthik Sarpatwari. Toward Increasing FPGA Lifetime

Volume 5, Issue 1

6 -- 21T. Y. Wong, Man Hon Wong, John C. S. Lui. A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
22 -- 36Zhenhai Duan, Xin Yuan, Jaideep Chandrashekar. Controlling IP Spoofing through Interdomain Packet Filters
37 -- 48Abhinav Srivastava, Amlan Kundu, Shamik Sural, Arun K. Majumdar. Credit Card Fraud Detection Using Hidden Markov Model
49 -- 61Mahalingam Ramkumar. Trustworthy Computing under Resource Constraints with the DOWN Policy