Loading…
Loading…
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
Chatterjee, Urbi, Govindan, Vidya, Sadhukhan, Rajat, Mukhopadhyay, Debdeep, Chakraborty, Rajat Subhra, Mahata, Debashis, Prabhu, Mukesh M.
Published in IEEE transactions on dependable and secure computing (01.05.2019)
Published in IEEE transactions on dependable and secure computing (01.05.2019)
Get full text
Journal Article
Loading…
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data
Zhang, Yue, Yu, Jia, Hao, Rong, Wang, Cong, Ren, Kui
Published in IEEE transactions on dependable and secure computing (01.05.2020)
Published in IEEE transactions on dependable and secure computing (01.05.2020)
Get full text
Journal Article
Loading…
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability
Li, Yannan, Yang, Guomin, Susilo, Willy, Yu, Yong, Au, Man Ho, Liu, Dongxi
Published in IEEE transactions on dependable and secure computing (01.03.2021)
Published in IEEE transactions on dependable and secure computing (01.03.2021)
Get full text
Journal Article
Loading…
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things
Zhang, Xiaojun, Xu, Chunxiang, Wang, Huaxiong, Zhang, Yuan, Wang, Shixiong
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Get full text
Journal Article
Loading…
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services
Liang, Jinwen, Qin, Zheng, Xiao, Sheng, Ou, Lu, Lin, Xiaodong
Published in IEEE transactions on dependable and secure computing (01.07.2021)
Published in IEEE transactions on dependable and secure computing (01.07.2021)
Get full text
Journal Article
Loading…
RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud
Wei, Jianghong, Chen, Xiaofeng, Huang, Xinyi, Hu, Xuexian, Susilo, Willy
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Get full text
Journal Article
Loading…
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks
Wang, Chenyu, Wang, Ding, Tu, Yi, Xu, Guoai, Wang, Huaxiong
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Get full text
Journal Article
Loading…
Make Web3.0 Connected
Liu, Zhuotao, Xiang, Yangxi, Shi, Jian, Gao, Peng, Wang, Haoyu, Xiao, Xusheng, Wen, Bihan, Li, Qi, Hu, Yih-Chun
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Get full text
Journal Article
Loading…
Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems
Zhang, Yuan, Xu, Chunxiang, Cheng, Nan, Shen, Xuemin Sherman
Published in IEEE transactions on dependable and secure computing (01.07.2022)
Published in IEEE transactions on dependable and secure computing (01.07.2022)
Get full text
Journal Article
Loading…
Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain
Guo, Yu, Zhang, Chen, Wang, Cong, Jia, Xiaohua
Published in IEEE transactions on dependable and secure computing (01.05.2023)
Published in IEEE transactions on dependable and secure computing (01.05.2023)
Get full text
Journal Article
Loading…
Loading…
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data
Miao, Yinbin, Deng, Robert H., Liu, Ximeng, Choo, Kim-Kwang Raymond, Wu, Hongjun, Li, Hongwei
Published in IEEE transactions on dependable and secure computing (01.07.2021)
Published in IEEE transactions on dependable and secure computing (01.07.2021)
Get full text
Journal Article
Loading…
VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning
Hahn, Changhee, Kim, Hodong, Kim, Minjae, Hur, Junbeom
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Published in IEEE transactions on dependable and secure computing (01.01.2023)
Get full text
Journal Article
Loading…
Reliable and Privacy-Preserving Truth Discovery for Mobile Crowdsensing Systems
Zhang, Chuan, Zhu, Liehuang, Xu, Chang, Liu, Ximeng, Sharif, Kashif
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Get full text
Journal Article
Loading…
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment
Chatterjee, Santanu, Roy, Sandip, Das, Ashok Kumar, Chattopadhyay, Samiran, Kumar, Neeraj, Vasilakos, Athanasios V.
Published in IEEE transactions on dependable and secure computing (01.09.2018)
Published in IEEE transactions on dependable and secure computing (01.09.2018)
Get full text
Journal Article
Loading…
Robust and Universal Seamless Handover Authentication in 5G HetNets
Zhang, Yinghui, Deng, Robert H., Bertino, Elisa, Zheng, Dong
Published in IEEE transactions on dependable and secure computing (01.03.2021)
Published in IEEE transactions on dependable and secure computing (01.03.2021)
Get full text
Journal Article
Loading…
Loading…
Loading…
Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data
Zheng, Yandong, Lu, Rongxing, Guan, Yunguo, Shao, Jun, Zhu, Hui
Published in IEEE transactions on dependable and secure computing (01.07.2022)
Published in IEEE transactions on dependable and secure computing (01.07.2022)
Get full text
Journal Article