Loading…
Loading…
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies
Nosouhi, Mohammad Reza, Yu, Shui, Sood, Keshav, Grobler, Marthie, Jurdak, Raja, Dorri, Ali, Shen, Shigen
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Get full text
Journal Article
Loading…
Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage
Ni, Jianbing, Zhang, Kuan, Yu, Yong, Yang, Tingting
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Get full text
Journal Article
Loading…
Price TAG: Towards Semi-Automatically Discovery Tactics, Techniques and Procedures OF E-Commerce Cyber Threat Intelligence
Wu, Yiming, Liu, Qianjun, Liao, Xiaojing, Ji, Shouling, Wang, Peng, Wang, Xiaofeng, Wu, Chunming, Li, Zhao
Published in IEEE transactions on dependable and secure computing (2024)
Published in IEEE transactions on dependable and secure computing (2024)
Get full text
Journal Article
Loading…
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems
Yan, Haonan, Li, Xiaoguang, Zhang, Wenjing, Wang, Rui, Li, Hui, Zhao, Xingwen, Li, Fenghua, Lin, Xiaodong
Published in IEEE transactions on dependable and secure computing (01.01.2024)
Published in IEEE transactions on dependable and secure computing (01.01.2024)
Get full text
Journal Article
Loading…
Loading…
Kaleidoscope: Physical Backdoor Attacks against Deep Neural Networks with RGB Filters
Gong, Xueluan, Wang, Ziyao, Chen, Yanjiao, Xue, Meng, Wang, Qian, Shen, Chao
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Get full text
Journal Article
Loading…
Towards Lightweight Authentication and Batch Verification Scheme in IoV
Sikarwar, Himani, Das, Debasis
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Get full text
Journal Article
Loading…
A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond
Lai, Chengzhe, Ma, Yixiao, Lu, Rongxing, Zhang, Yinghui, Zheng, Dong
Published in IEEE transactions on dependable and secure computing (01.07.2023)
Published in IEEE transactions on dependable and secure computing (01.07.2023)
Get full text
Journal Article
Loading…
Secure Overlay Cloud Storage with Access Control and Assured Deletion
Yang Tang, Lee, P. P. C., Lui, J. C. S., Perlman, R.
Published in IEEE transactions on dependable and secure computing (01.11.2012)
Published in IEEE transactions on dependable and secure computing (01.11.2012)
Get full text
Journal Article
Loading…
Loading…
Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope
Torabi, Sadegh, Bou-Harb, Elias, Assi, Chadi, Karbab, ElMouatez Billah, Boukhtouta, Amine, Debbabi, Mourad
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Get full text
Journal Article
Loading…
Forward and Backward Private DSSE for Range Queries
Zuo, Cong, Sun, Shi-Feng, Liu, Joseph K., Shao, Jun, Pieprzyk, Josef, Xu, Lei
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Get full text
Journal Article
Loading…
Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks
Li, Huaxin, Chen, Qingrong, Zhu, Haojin, Ma, Di, Wen, Hong, Shen, Xuemin
Published in IEEE transactions on dependable and secure computing (01.03.2020)
Published in IEEE transactions on dependable and secure computing (01.03.2020)
Get full text
Journal Article
Loading…
Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data
Yu, Jiadi, Lu, Peng, Zhu, Yanmin, Xue, Guangtao, Li, Minglu
Published in IEEE transactions on dependable and secure computing (01.07.2013)
Published in IEEE transactions on dependable and secure computing (01.07.2013)
Get full text
Journal Article
Loading…
Sixteen Years of Phishing User Studies: What Have We Learned?
Baki, Shahryar, Verma, Rakesh M.
Published in IEEE transactions on dependable and secure computing (01.03.2023)
Published in IEEE transactions on dependable and secure computing (01.03.2023)
Get full text
Journal Article
Loading…
A Shoulder Surfing Resistant Graphical Authentication System
Sun, Hung-Min, Chen, Shiuan-Tung, Yeh, Jyh-Haw, Cheng, Chia-Yun
Published in IEEE transactions on dependable and secure computing (01.03.2018)
Published in IEEE transactions on dependable and secure computing (01.03.2018)
Get full text
Journal Article
Loading…
Loading…
Securely and Efficiently Outsourcing Decision Tree Inference
Zheng, Yifeng, Duan, Huayi, Wang, Cong, Wang, Ruochen, Nepal, Surya
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Get full text
Journal Article
Loading…