首页 文献索引 SCI期刊 AI助手
期刊目录筛选

期刊名:Ieee transactions on dependable and secure computing

缩写:IEEE T DEPEND SECURE

ISSN:1545-5971

e-ISSN:1941-0018

IF/分区:7.5/Q1

文章目录 更多期刊信息

共收录本刊相关文章索引8
Clinical Trial Case Reports Meta-Analysis RCT Review Systematic Review
Classical Article Case Reports Clinical Study Clinical Trial Clinical Trial Protocol Comment Comparative Study Editorial Guideline Letter Meta-Analysis Multicenter Study Observational Study Randomized Controlled Trial Review Systematic Review
Ahmed Akhtar,Masoud Barati,Basit Shafiq et al. Ahmed Akhtar et al.
The use of blockchain technology has been proposed to provide auditable access control for individual resources. Unlike the case where all resources are owned by a single organization, this work focuses on distributed applications such as b...
Tianxi Ji,Erman Ayday,Emre Yilmaz et al. Tianxi Ji et al.
Database fingerprinting is widely adopted to prevent unauthorized data sharing and identify source of data leakages. Although existing schemes are robust against common attacks, their robustness degrades significantly if attackers utilize i...
Wenhao Wang,Weijie Liu,Hongbo Chen et al. Wenhao Wang et al.
Due to the absence of in-enclave isolation, today's trusted execution environment (TEE), specifically Intel's Software Guard Extensions (SGX), does not have the capability to securely run different users' tasks within a single enclave, whic...
Ruiyu Zhu,Yan Huang Ruiyu Zhu
Secure string-comparison by some non-linear metrics such as edit-distance and its variations is an important building block of many applications including patient genome matching and text-based intrusion detection. Despite the significance ...
Nitish Uplavikar,Brad Malin,Wei Jiang Nitish Uplavikar
Information retrieval (IR) plays an essential role in daily life. However, currently deployed IR technologies, e.g., Apache Lucene - open-source search software, are insufficient when the information is protected or deemed to be private. Fo...
Yasmeen Alufaisan,Murat Kantarcioglu,Yan Zhou Yasmeen Alufaisan
Transparency has become a critical need in machine learning (ML) applications. Designing transparent ML models helps increase trust, ensure accountability, and scrutinize fairness. Some organizations may opt-out of transparency to protect i...
Slawomir Goryczka,Li Xiong Slawomir Goryczka
This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Sha...
You Chen,Steve Nyemba,Bradley Malin You Chen
Collaborative information systems (CISs) are deployed within a diverse array of environments that manage sensitive information. Current security mechanisms detect insider threats, but they are ill-suited to monitor systems in which users fu...