Journal: IEEE Trans. Dependable Sec. Comput.

Volume 6, Issue 4

241 -- 254Alain Girault, Hamoudi Kalla. A Novel Bicriteria Scheduling Heuristics Providing a Guaranteed Global System Failure Rate
255 -- 268Harris E. Michail, Athanasios Kakarountas, Athanasios Milidonis, Costas E. Goutis. A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores
269 -- 281Martin Hutle, Dahlia Malkhi, Ulrich Schmid, Lidong Zhou. Chasing the Weakest System Model for Implementing Ω and Consensus
282 -- 294Babak Rahbaran, Andreas Steininger. Is Asynchronous Logic More Robust Than Synchronous Logic?
295 -- 308Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-Rotaru. JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks
309 -- 315Amlan Kundu, Suvasini Panigrahi, Shamik Sural, Arun K. Majumdar. BLAST-SSAHA Hybridization for Credit Card Fraud Detection
316 -- 320Raphael C.-W. Phan. Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI

Volume 6, Issue 3

161 -- 174Liudong Xing, Yuanshun Dai. A New Decision-Diagram-Based Method for Efficient Analysis on Multistate Systems
175 -- 187Agustin Dominguez-Oviedo, M. Anwar Hasan. Error Detection and Fault Tolerance in ECSM Using Input Randomization
188 -- 201Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu. KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services
202 -- 216Rajaraman Ramanarayanan, Vijay Degalahal, Krishnan Ramakrishnan, Jung Sub Kim, Vijaykrishnan Narayanan, Yuan Xie, Mary Jane Irwin, Kenan Unlu. Modeling Soft Errors at the Device and Logic Levels for Combinational Circuits
217 -- 230Oguz Ergin, Osman S. Unsal, Xavier Vera, Antonio González. Reducing Soft Errors through Operand Width Aware Policies
231 -- 240Irith Pomeranz, Sudhakar M. Reddy. Semiconcurrent Online Testing of Transition Faults through Output Response Comparison of Identical Circuits

Volume 6, Issue 2

81 -- 95Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas. Accurately Measuring Denial of Service in Simulation and Testbed Experiments
96 -- 110Debin Gao, Michael K. Reiter, Dawn Xiaodong Song. Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance
111 -- 123Patrick Tague, David Slater, Jason Rogers, Radha Poovendran. Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
124 -- 134George Xenoulis, Dimitris Gizopoulos, Mihalis Psarakis, Antonis M. Paschalis. Instruction-Based Online Periodic Self-Testing of Microprocessors with Floating-Point Units
135 -- 148Alex Shye, Joseph Blomstedt, Tipp Moseley, Vijay Janapa Reddi, Daniel A. Connors. PLR: A Software Approach to Transient Fault Tolerance for Multicore Architectures
149 -- 151Huaqun Wang, Futai Zhang, Yanfei Sun. Cryptanalysis of a Generalized Ring Signature Scheme
152 -- 158Dimitris Gizopoulos. Online Periodic Self-Test Scheduling for Real-Time Processor-Based Systems Dependability Enhancement
159 -- 160Hung-Min Sun, King-Hang Wang, Chien-Ming Chen. On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme

Volume 6, Issue 1

4 -- 17Salvatore Distefano, Antonio Puliafito. Dependability Evaluation with Dynamic Reliability Block Diagrams and Dynamic Fault Trees
18 -- 31Albert Meixner, Daniel J. Sorin. Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures
32 -- 44Samir Jafar, Axel W. Krings, Thierry Gautier. Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
45 -- 58Ayda Saïdane, Vincent Nicomette, Yves Deswarte. The Design of a Generic Intrusion-Tolerant Architecture for Web Servers
59 -- 72Theresa C. Maxino, Philip J. Koopman Jr.. The Effectiveness of Checksums for Embedded Control Networks
73 -- 77Tianjie Cao, Elisa Bertino, Hong Lei. Security Analysis of the SASI Protocol