default search action
IEEE Transactions on Dependable and Secure Computing, Volume 6
Volume 6, Number 1, January - March 2009
- Salvatore Distefano, Antonio Puliafito:
Dependability Evaluation with Dynamic Reliability Block Diagrams and Dynamic Fault Trees. 4-17 - Albert Meixner, Daniel J. Sorin:
Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures. 18-31 - Samir Jafar, Axel W. Krings, Thierry Gautier:
Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing. 32-44 - Ayda Saïdane, Vincent Nicomette, Yves Deswarte:
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers. 45-58 - Theresa C. Maxino, Philip J. Koopman Jr.:
The Effectiveness of Checksums for Embedded Control Networks. 59-72 - Tianjie Cao, Elisa Bertino, Hong Lei:
Security Analysis of the SASI Protocol. 73-77
Volume 6, Number 2, April - June 2009
- Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter L. Reiher, Roshan K. Thomas:
Accurately Measuring Denial of Service in Simulation and Testbed Experiments. 81-95 - Debin Gao, Michael K. Reiter, Dawn Xiaodong Song:
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance. 96-110 - Patrick Tague, David Slater, Jason Rogers, Radha Poovendran:
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis. 111-123 - George Xenoulis, Dimitris Gizopoulos, Mihalis Psarakis, Antonis M. Paschalis:
Instruction-Based Online Periodic Self-Testing of Microprocessors with Floating-Point Units. 124-134 - Alex Shye, Joseph Blomstedt, Tipp Moseley, Vijay Janapa Reddi, Daniel A. Connors:
PLR: A Software Approach to Transient Fault Tolerance for Multicore Architectures. 135-148 - Huaqun Wang, Futai Zhang, Yanfei Sun:
Cryptanalysis of a Generalized Ring Signature Scheme. 149-151 - Dimitris Gizopoulos:
Online Periodic Self-Test Scheduling for Real-Time Processor-Based Systems Dependability Enhancement. 152-158 - Hung-Min Sun, King-Hang Wang, Chien-Ming Chen:
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme. 159-160
Volume 6, Number 3, July - September 2009
- Liudong Xing, Yuanshun Dai:
A New Decision-Diagram-Based Method for Efficient Analysis on Multistate Systems. 161-174 - Agustin Dominguez-Oviedo, M. Anwar Hasan:
Error Detection and Fault Tolerance in ECSM Using Input Randomization. 175-187 - Qijun Gu, Peng Liu, Wang-Chien Lee, Chao-Hsien Chu:
KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services. 188-201 - Rajaraman Ramanarayanan, Vijay Degalahal, Krishnan Ramakrishnan, Jungsub Kim, Vijaykrishnan Narayanan, Yuan Xie, Mary Jane Irwin, Kenan Unlu:
Modeling Soft Errors at the Device and Logic Levels for Combinational Circuits. 202-216 - Oguz Ergin, Osman S. Unsal, Xavier Vera, Antonio González:
Reducing Soft Errors through Operand Width Aware Policies. 217-230 - Irith Pomeranz, Sudhakar M. Reddy:
Semiconcurrent Online Testing of Transition Faults through Output Response Comparison of Identical Circuits. 231-240
Volume 6, Number 4, October - December 2009
- Alain Girault, Hamoudi Kalla:
A Novel Bicriteria Scheduling Heuristics Providing a Guaranteed Global System Failure Rate. 241-254 - Harris E. Michail, Athanasios Kakarountas, Athanasios Milidonis, Costas E. Goutis:
A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores. 255-268 - Martin Hutle, Dahlia Malkhi, Ulrich Schmid, Lidong Zhou:
Chasing the Weakest System Model for Implementing Ω and Consensus. 269-281 - Babak Rahbaran, Andreas Steininger:
Is Asynchronous Logic More Robust Than Synchronous Logic?. 282-294 - Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-Rotaru:
JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks. 295-308 - Amlan Kundu, Suvasini Panigrahi, Shamik Sural, Arun K. Majumdar:
BLAST-SSAHA Hybridization for Credit Card Fraud Detection. 309-315 - Raphael C.-W. Phan:
Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI. 316-320
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.