• The IEEE Transactions on Dependable and Secure Computing is a bimonthly peer-reviewed scientific journal covering all aspects of dependability and security...
    2 KB (82 words) - 16:38, 25 May 2024
  • Dependable and Secure Computing," IEEE Transactions on Dependable and Secure Computing, vol. 1, pp. 11-33, 2004. "Dependable Systems and Networks". www...
    16 KB (2,054 words) - 14:30, 14 February 2023
  • Computers, IEEE Transactions on Consumer Electronics, IEEE Transactions on Control Systems Technology, IEEE Transactions on Dependable and Secure Computing, IEEE...
    19 KB (1,188 words) - 09:18, 28 May 2024
  • Byzantine fault (category Distributed computing problems)
    (2004). "Basic concepts and taxonomy of dependable and secure computing". IEEE Transactions on Dependable and Secure Computing. 1 (1): 11–33. doi:10.1109/TDSC...
    33 KB (3,754 words) - 18:08, 1 March 2024
  • Qi; Hu, Yih-Chun (2021). "Make Web3.0 Connected". IEEE Transactions on Dependable and Secure Computing. 19 (5): 2965–2981. doi:10.1109/TDSC.2021.3079315...
    32 KB (2,845 words) - 16:18, 1 July 2024
  • Scoring System be Trusted? A Bayesian Analysis". IEEE Transactions on Dependable and Secure Computing. 15 (6): 1002–1015. doi:10.1109/TDSC.2016.2644614...
    29 KB (2,762 words) - 02:53, 7 April 2024
  • Cryptography in Internet-Scale Systems: A Case Study on DNSSEC". IEEE Transactions on Dependable and Secure Computing. 8 (5). pp. 656–669. CiteSeerX 10.1.1.158.1984...
    63 KB (7,733 words) - 06:54, 19 June 2024
  • Thumbnail for Physical unclonable function
    Fuzzy Extractors and Cryptographically-Secure Physical Unclonable Functions," IEEE Transactions on Dependable and Secure Computing, January 2017. McGrath...
    35 KB (4,114 words) - 18:07, 31 May 2024
  • Checksums for Embedded Control Networks" (PDF). IEEE Transactions on Dependable and Secure Computing. RFC 3309 "Cbloom rants: 08-21-10 - Adler32". 21...
    10 KB (887 words) - 12:13, 23 March 2023
  • Thumbnail for Computer worm
    Bagchi, S. (2008). "Modeling and Automated Containment of Worms". IEEE Transactions on Dependable and Secure Computing. 5 (2): 71–86. doi:10.1109/tdsc...
    23 KB (2,604 words) - 16:05, 28 June 2024
  • Checksums for Embedded Control Networks" (PDF). IEEE Transactions on Dependable and Secure Computing. J. Zweig, UIUC, C. Partridge, BBN (February 1990)...
    18 KB (2,590 words) - 12:57, 20 October 2023
  • "Searchable Encryption over Feature-Rich Data". IEEE Transactions on Dependable and Secure Computing. 15 (3): 496–510. doi:10.1109/TDSC.2016.2593444....
    53 KB (6,675 words) - 14:12, 15 June 2024
  • Delay-based Location Verification for the Internet" (PDF). IEEE Transactions on Dependable and Secure Computing. 14 (2): 130–144. CiteSeerX 10.1.1.696.691. doi:10...
    30 KB (2,979 words) - 11:54, 6 June 2024
  • Thumbnail for Multi-factor authentication
    Beyond Attainment" (PDF). IEEE Transactions on Dependable and Secure Computing. Piscataway, New Jersey: Institute of Electrical and Electronics Engineers...
    38 KB (4,242 words) - 23:34, 17 June 2024
  • ". IEEE Transactions on Dependable and Secure Computing. 9 (6): 811–824. doi:10.1109/TDSC.2012.75. ISSN 1545-5971. S2CID 351844. "Measurement and Classification...
    7 KB (697 words) - 06:55, 18 May 2024
  • Vulnerabilities of Existing Designs, and Countermeasures". IEEE Transactions on Dependable and Secure Computing (Website). 16 (6) (1st ed.): 1040–1053...
    39 KB (3,639 words) - 15:19, 19 June 2024
  • Confidential computing is a security and privacy-enhancing computational technique focused on protecting data in use. Confidential computing can be used...
    45 KB (4,300 words) - 14:31, 16 February 2024
  • the Editor in Chief of the IEEE Transactions on Dependable and Secure Computing. Research Gligor’s research in computer and network security spans over...
    20 KB (2,307 words) - 22:12, 5 February 2024
  • Thumbnail for Image sharing
    Decision: Control of Photo Sharing on Online Social Networks". IEEE Transactions on Dependable and Secure Computing. PP (99): 199–210. doi:10.1109/TDSC...
    30 KB (3,559 words) - 04:31, 26 April 2024
  • Thumbnail for Social media
    Twitter accounts: Are you a human, bot, or cyborg?". IEEE Transactions on Dependable and Secure Computing. 9 (6): 811–824. doi:10.1109/tdsc.2012.75. S2CID 351844...
    164 KB (20,119 words) - 10:35, 2 July 2024
  • Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds". 2018 IEEE Conference on Dependable and Secure Computing (DSC). pp. 1–4. doi:10.1109/DESEC...
    6 KB (895 words) - 12:53, 17 February 2024
  • "Supersingular Isogeny Diffie-Hellman Key Exchange on 64-bit ARM". IEEE Transactions on Dependable and Secure Computing. PP (99): 902–912. doi:10.1109/TDSC.2017...
    25 KB (3,699 words) - 00:30, 30 December 2023
  • Thumbnail for Theil–Sen estimator
    Comprehensive Model for Software Rejuvenation", IEEE Transactions on Dependable and Secure Computing, 2 (2): 124–137, doi:10.1109/TDSC.2005.15, S2CID 15105513...
    27 KB (2,803 words) - 06:58, 11 March 2024
  • Thumbnail for Willy Susilo
    of IEEE Transactions on Dependable and Secure Computing (TDSC) and has served an Associate Editor of IEEE Transactions on Information Forensics and Security...
    9 KB (777 words) - 03:08, 3 November 2023
  • Twitter bot (category Twitter services and applications)
    Accounts: Are You a Human, Bot, or Cyborg?" (PDF). IEEE Transactions on Dependable and Secure Computing. 9 (6): 811–824. doi:10.1109/TDSC.2012.75. ISSN 1545-5971...
    44 KB (3,905 words) - 19:06, 20 May 2024
  • Paxos (computer science) (category CS1 maint: date and year)
    Lorenzo (July 2006). "Fast Byzantine Consensus" (PDF). IEEE Transactions on Dependable and Secure Computing. 3 (3): 202–215. doi:10.1109/TDSC.2006.35. Retrieved...
    64 KB (6,947 words) - 13:37, 15 March 2024
  • Sensor Networks". 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). Cairo: IEEE. pp. 313–320. doi:10...
    53 KB (6,401 words) - 14:47, 23 April 2024
  • Thumbnail for ArpON
    Man-in-the-Middle Attacks in Ethernet Networks". IEEE Transactions on Dependable and Secure Computing. 19 (6): 4082–4098. doi:10.1109/TDSC.2021.3118448...
    11 KB (857 words) - 10:59, 11 April 2024
  • "Low-Rate DoS Attacks Detection Based on Network Multifractal". IEEE Transactions on Dependable and Secure Computing. 13 (5): 559–567. doi:10.1109/TDSC.2015...
    5 KB (586 words) - 05:47, 9 April 2024
  • Fred B. Schneider (category Fellows of the IEEE)
    Computing Surveys, High Integrity Systems, IEEE Transactions on Dependable and Secure Computing, and Information Processing Letters. Schneider is a Fellow...
    10 KB (714 words) - 00:08, 2 May 2024