The IEEE Transactions on Dependable and Secure Computing is a bimonthly peer-reviewed scientific journal covering all aspects of dependability and security...
2 KB (82 words) - 16:38, 25 May 2024
Dependable and Secure Computing," IEEE Transactions on Dependable and Secure Computing, vol. 1, pp. 11-33, 2004. "Dependable Systems and Networks". www...
16 KB (2,054 words) - 14:30, 14 February 2023
Computers, IEEE Transactions on Consumer Electronics, IEEE Transactions on Control Systems Technology, IEEE Transactions on Dependable and Secure Computing, IEEE...
19 KB (1,188 words) - 09:18, 28 May 2024
Byzantine fault (category Distributed computing problems)
(2004). "Basic concepts and taxonomy of dependable and secure computing". IEEE Transactions on Dependable and Secure Computing. 1 (1): 11–33. doi:10.1109/TDSC...
33 KB (3,754 words) - 18:08, 1 March 2024
Qi; Hu, Yih-Chun (2021). "Make Web3.0 Connected". IEEE Transactions on Dependable and Secure Computing. 19 (5): 2965–2981. doi:10.1109/TDSC.2021.3079315...
32 KB (2,845 words) - 16:18, 1 July 2024
Scoring System be Trusted? A Bayesian Analysis". IEEE Transactions on Dependable and Secure Computing. 15 (6): 1002–1015. doi:10.1109/TDSC.2016.2644614...
29 KB (2,762 words) - 02:53, 7 April 2024
Domain Name System Security Extensions (redirect from Secure DNS)
Cryptography in Internet-Scale Systems: A Case Study on DNSSEC". IEEE Transactions on Dependable and Secure Computing. 8 (5). pp. 656–669. CiteSeerX 10.1.1.158.1984...
63 KB (7,733 words) - 06:54, 19 June 2024
Fuzzy Extractors and Cryptographically-Secure Physical Unclonable Functions," IEEE Transactions on Dependable and Secure Computing, January 2017. McGrath...
35 KB (4,114 words) - 18:07, 31 May 2024
Adler-32 (section Advantages and disadvantages)
Checksums for Embedded Control Networks" (PDF). IEEE Transactions on Dependable and Secure Computing. RFC 3309 "Cbloom rants: 08-21-10 - Adler32". 21...
10 KB (887 words) - 12:13, 23 March 2023
Computer worm (redirect from Worm (computing))
Bagchi, S. (2008). "Modeling and Automated Containment of Worms". IEEE Transactions on Dependable and Secure Computing. 5 (2): 71–86. doi:10.1109/tdsc...
23 KB (2,604 words) - 16:05, 28 June 2024
Fletcher's checksum (section Caution on modulus)
Checksums for Embedded Control Networks" (PDF). IEEE Transactions on Dependable and Secure Computing. J. Zweig, UIUC, C. Partridge, BBN (February 1990)...
18 KB (2,590 words) - 12:57, 20 October 2023
"Searchable Encryption over Feature-Rich Data". IEEE Transactions on Dependable and Secure Computing. 15 (3): 496–510. doi:10.1109/TDSC.2016.2593444....
53 KB (6,675 words) - 14:12, 15 June 2024
Delay-based Location Verification for the Internet" (PDF). IEEE Transactions on Dependable and Secure Computing. 14 (2): 130–144. CiteSeerX 10.1.1.696.691. doi:10...
30 KB (2,979 words) - 11:54, 6 June 2024
Beyond Attainment" (PDF). IEEE Transactions on Dependable and Secure Computing. Piscataway, New Jersey: Institute of Electrical and Electronics Engineers...
38 KB (4,242 words) - 23:34, 17 June 2024
". IEEE Transactions on Dependable and Secure Computing. 9 (6): 811–824. doi:10.1109/TDSC.2012.75. ISSN 1545-5971. S2CID 351844. "Measurement and Classification...
7 KB (697 words) - 06:55, 18 May 2024
Vulnerabilities of Existing Designs, and Countermeasures". IEEE Transactions on Dependable and Secure Computing (Website). 16 (6) (1st ed.): 1040–1053...
39 KB (3,639 words) - 15:19, 19 June 2024
Confidential computing is a security and privacy-enhancing computational technique focused on protecting data in use. Confidential computing can be used...
45 KB (4,300 words) - 14:31, 16 February 2024
Virgil D. Gligor (section Education and career)
the Editor in Chief of the IEEE Transactions on Dependable and Secure Computing. Research Gligor’s research in computer and network security spans over...
20 KB (2,307 words) - 22:12, 5 February 2024
Decision: Control of Photo Sharing on Online Social Networks". IEEE Transactions on Dependable and Secure Computing. PP (99): 199–210. doi:10.1109/TDSC...
30 KB (3,559 words) - 04:31, 26 April 2024
Social media (redirect from Impact of social media on mental health)
Twitter accounts: Are you a human, bot, or cyborg?". IEEE Transactions on Dependable and Secure Computing. 9 (6): 811–824. doi:10.1109/tdsc.2012.75. S2CID 351844...
164 KB (20,119 words) - 10:35, 2 July 2024
Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds". 2018 IEEE Conference on Dependable and Secure Computing (DSC). pp. 1–4. doi:10.1109/DESEC...
6 KB (895 words) - 12:53, 17 February 2024
"Supersingular Isogeny Diffie-Hellman Key Exchange on 64-bit ARM". IEEE Transactions on Dependable and Secure Computing. PP (99): 902–912. doi:10.1109/TDSC.2017...
25 KB (3,699 words) - 00:30, 30 December 2023
Comprehensive Model for Software Rejuvenation", IEEE Transactions on Dependable and Secure Computing, 2 (2): 124–137, doi:10.1109/TDSC.2005.15, S2CID 15105513...
27 KB (2,803 words) - 06:58, 11 March 2024
Willy Susilo (section Publications and awards)
of IEEE Transactions on Dependable and Secure Computing (TDSC) and has served an Associate Editor of IEEE Transactions on Information Forensics and Security...
9 KB (777 words) - 03:08, 3 November 2023
Twitter bot (category Twitter services and applications)
Accounts: Are You a Human, Bot, or Cyborg?" (PDF). IEEE Transactions on Dependable and Secure Computing. 9 (6): 811–824. doi:10.1109/TDSC.2012.75. ISSN 1545-5971...
44 KB (3,905 words) - 19:06, 20 May 2024
Paxos (computer science) (category CS1 maint: date and year)
Lorenzo (July 2006). "Fast Byzantine Consensus" (PDF). IEEE Transactions on Dependable and Secure Computing. 3 (3): 202–215. doi:10.1109/TDSC.2006.35. Retrieved...
64 KB (6,947 words) - 13:37, 15 March 2024
Wireless sensor network (redirect from Secure data aggregation in WSN)
Sensor Networks". 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). Cairo: IEEE. pp. 313–320. doi:10...
53 KB (6,401 words) - 14:47, 23 April 2024
Man-in-the-Middle Attacks in Ethernet Networks". IEEE Transactions on Dependable and Secure Computing. 19 (6): 4082–4098. doi:10.1109/TDSC.2021.3118448...
11 KB (857 words) - 10:59, 11 April 2024
"Low-Rate DoS Attacks Detection Based on Network Multifractal". IEEE Transactions on Dependable and Secure Computing. 13 (5): 559–567. doi:10.1109/TDSC.2015...
5 KB (586 words) - 05:47, 9 April 2024
Fred B. Schneider (category Fellows of the IEEE)
Computing Surveys, High Integrity Systems, IEEE Transactions on Dependable and Secure Computing, and Information Processing Letters. Schneider is a Fellow...
10 KB (714 words) - 00:08, 2 May 2024