Search Results - "IEEE transactions on dependable and secure computing"
-
1
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
Published in IEEE transactions on dependable and secure computing (01-03-2021)“…Existing security and identity-based vehicular communication protocols used in Vehicular Ad-hoc Networks (VANETs) to achieve conditional privacy-preserving…”
Get full text
Journal Article -
2
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
Published in IEEE transactions on dependable and secure computing (01-01-2019)“…Data integrity, a core security issue in reliable cloud storage, has received much attention. Data auditing protocols enable a verifier to efficiently check…”
Get full text
Journal Article -
3
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention
Published in IEEE transactions on dependable and secure computing (01-01-2018)“…Android users are constantly threatened by an increasing number of malicious applications (apps), generically called malware. Malware constitutes a serious…”
Get full text
Journal Article -
4
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
Published in IEEE transactions on dependable and secure computing (01-05-2021)“…Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and supports fine-grained access control over encrypted data in the…”
Get full text
Journal Article -
5
μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
Published in IEEE transactions on dependable and secure computing (01-09-2021)Get full text
Journal Article -
6
Searchable Symmetric Encryption with Forward Search Privacy
Published in IEEE transactions on dependable and secure computing (01-01-2021)“…Searchable symmetric encryption (SSE) has been widely applied in the encrypted database for queries in practice. Although SSE is powerful and feature-rich, it…”
Get full text
Journal Article -
7
Trust-Based Service Management for Social Internet of Things Systems
Published in IEEE transactions on dependable and secure computing (01-11-2016)“…A social internet of things (IoT) system can be viewed as a mix of traditional peer-to-peer networks and social networks, where "things" autonomously establish…”
Get full text
Journal Article -
8
A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing
Published in IEEE transactions on dependable and secure computing (01-05-2021)“…The proliferation of various mobile devices equipped with cameras results in an exponential growth of the amount of images. Recent advances in the deep…”
Get full text
Journal Article -
9
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things
Published in IEEE transactions on dependable and secure computing (01-05-2021)“…Cloud-assisted Industrial Internet of Things (IIoT) relies on cloud computing to provide massive data storage services. To ensure the confidentiality,…”
Get full text
Journal Article -
10
Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA
Published in IEEE transactions on dependable and secure computing (01-07-2022)“…Industrial control systems (ICSs) are widely used and vital to industry and society. Their failure can have severe impact on both the economy and human life…”
Get full text
Journal Article -
11
Privacy-Preserving Federated Deep Learning With Irregular Users
Published in IEEE transactions on dependable and secure computing (01-03-2022)“…Federated deep learning has been widely used in various fields. To protect data privacy, many privacy-preservingapproaches have been designed and implemented…”
Get full text
Journal Article -
12
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data
Published in IEEE transactions on dependable and secure computing (01-07-2021)“…Searchable Encryption (SE) is an important technique to guarantee data security and usability in the cloud at the same time. Leveraging Ciphertext-Policy…”
Get full text
Journal Article -
13
Dependable Structural Health Monitoring Using Wireless Sensor Networks
Published in IEEE transactions on dependable and secure computing (01-07-2017)“…As an alternative to current wired-based networks, wireless sensor networks (WSNs) are becoming an increasingly compelling platform for engineering structural…”
Get full text
Journal Article -
14
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability
Published in IEEE transactions on dependable and secure computing (01-03-2021)“…Monero provides a high level of anonymity for both users and their transactions. However, many criminal activities might be committed with the protection of…”
Get full text
Journal Article -
15
Robust and Universal Seamless Handover Authentication in 5G HetNets
Published in IEEE transactions on dependable and secure computing (01-03-2021)“…The evolving fifth generation (5G) cellular networks will be a collection of heterogeneous and backward-compatible networks. With the increased heterogeneity…”
Get full text
Journal Article -
16
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers
Published in IEEE transactions on dependable and secure computing (01-01-2018)“…In this paper, we propose a framework for efficient and privacy-preserving outsourced calculation of rational numbers, which we refer to as POCR. Using POCR, a…”
Get full text
Journal Article -
17
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
Published in IEEE transactions on dependable and secure computing (01-09-2020)“…Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy,…”
Get full text
Journal Article -
18
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
Published in IEEE transactions on dependable and secure computing (01-03-2022)“…Cloud-fog computing is a novel paradigm to extend the functionality of cloud computing to provide a variety of on-demand data services via the edge network…”
Get full text
Journal Article -
19
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT
Published in IEEE transactions on dependable and secure computing (01-01-2022)“…The Internet of Things (IoT) is experiencing explosive growth and has gained extensive attention from academia and industry in recent years. However, most of…”
Get full text
Journal Article -
20
Timely Detection and Mitigation of Stealthy DDoS Attacks Via IoT Networks
Published in IEEE transactions on dependable and secure computing (01-09-2021)“…Internet of Things (IoT) networks consist of sensors, actuators, mobile and wearable devices that can connect to the Internet. With billions of such devices…”
Get full text
Journal Article