Dependable and Secure Computing," IEEE Transactions on Dependable and Secure Computing, vol. 1, pp. 11-33, 2004. "Dependable Systems and Networks". www...
17 KB (2,055 words) - 14:07, 9 May 2025
The IEEE Transactions on Dependable and Secure Computing is a bimonthly peer-reviewed scientific journal covering all aspects of dependability and security...
2 KB (82 words) - 16:38, 25 May 2024
Computers, IEEE Transactions on Consumer Electronics, IEEE Transactions on Control Systems Technology, IEEE Transactions on Dependable and Secure Computing, IEEE...
19 KB (1,197 words) - 05:44, 13 July 2025
Byzantine fault (category Distributed computing problems)
(2004). "Basic concepts and taxonomy of dependable and secure computing". IEEE Transactions on Dependable and Secure Computing. 1 (1): 11–33. doi:10.1109/TDSC...
34 KB (4,058 words) - 16:43, 22 February 2025
Vulnerabilities of Existing Designs, and Countermeasures". IEEE Transactions on Dependable and Secure Computing (Website). 16 (6) (1st ed.): 1040–1053...
38 KB (3,527 words) - 11:34, 24 June 2025
Social media (redirect from Political polarization on social media)
Twitter accounts: Are you a human, bot, or cyborg?". IEEE Transactions on Dependable and Secure Computing. 9 (6): 811–824. doi:10.1109/tdsc.2012.75. S2CID 351844...
175 KB (21,514 words) - 13:42, 15 July 2025
Computer worm (redirect from Worm (computing))
Bagchi, S. (2008). "Modeling and Automated Containment of Worms". IEEE Transactions on Dependable and Secure Computing. 5 (2): 71–86. doi:10.1109/tdsc...
24 KB (2,746 words) - 12:35, 11 July 2025
"Searchable Encryption over Feature-Rich Data". IEEE Transactions on Dependable and Secure Computing. 15 (3): 496–510. doi:10.1109/TDSC.2016.2593444....
53 KB (6,653 words) - 07:07, 25 June 2025
Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds". 2018 IEEE Conference on Dependable and Secure Computing (DSC). pp. 1–4. doi:10.1109/DESEC...
6 KB (897 words) - 03:10, 24 January 2025
Domain Name System Security Extensions (redirect from Secure DNS)
Cryptography in Internet-Scale Systems: A Case Study on DNSSEC". IEEE Transactions on Dependable and Secure Computing. 8 (5). pp. 656–669. CiteSeerX 10.1.1.158.1984...
64 KB (7,741 words) - 08:19, 9 March 2025
Lorenzo (July 2006). "Fast Byzantine Consensus" (PDF). IEEE Transactions on Dependable and Secure Computing. 3 (3): 202–215. doi:10.1109/TDSC.2006.35. Retrieved...
63 KB (6,819 words) - 12:00, 30 June 2025
Delay-based Location Verification for the Internet" (PDF). IEEE Transactions on Dependable and Secure Computing. 14 (2): 130–144. CiteSeerX 10.1.1.696.691. doi:10...
33 KB (3,312 words) - 05:01, 15 July 2025
Confidential computing is a security and privacy-enhancing computational technique focused on protecting data in use. Confidential computing can be used...
47 KB (4,453 words) - 16:19, 8 June 2025
Adler-32 (section Advantages and disadvantages)
Checksums for Embedded Control Networks" (PDF). IEEE Transactions on Dependable and Secure Computing. RFC 3309 "Cbloom rants: 08-21-10 - Adler32". 21...
10 KB (888 words) - 12:36, 4 July 2025
Beyond Attainment" (PDF). IEEE Transactions on Dependable and Secure Computing. Piscataway, New Jersey: Institute of Electrical and Electronics Engineers...
43 KB (4,790 words) - 23:23, 16 July 2025
Scoring System be Trusted? A Bayesian Analysis". IEEE Transactions on Dependable and Secure Computing. 15 (6): 1002–1015. doi:10.1109/TDSC.2016.2644614...
35 KB (3,387 words) - 21:35, 24 May 2025
Cyborg (category Commons category link is on Wikidata)
Twitter Accounts: Are You a Human, Bot, or Cyborg?". IEEE Transactions on Dependable and Secure Computing. 9 (6): 811–824. doi:10.1109/TDSC.2012.75. S2CID 351844...
102 KB (11,464 words) - 20:49, 11 July 2025
Decision: Control of Photo Sharing on Online Social Networks". IEEE Transactions on Dependable and Secure Computing. PP (99): 199–210. doi:10.1109/TDSC...
30 KB (3,510 words) - 20:08, 25 June 2025
Fred B. Schneider (category Fellows of the IEEE)
Computing Surveys, High Integrity Systems, IEEE Transactions on Dependable and Secure Computing, and Information Processing Letters. Schneider is a Fellow...
10 KB (713 words) - 21:19, 23 October 2024
Fletcher's checksum (section Caution on modulus)
Checksums for Embedded Control Networks" (PDF). IEEE Transactions on Dependable and Secure Computing. J. Zweig, UIUC, C. Partridge, BBN (February 1990)...
18 KB (2,587 words) - 22:57, 24 May 2025
CryptoVerif (category Official website different in Wikidata and Wikipedia)
Sound Mechanized Prover for Security Protocols". IEEE Transactions on Dependable and Secure Computing. 5 (4): 193–207. doi:10.1109/TDSC.2007.1005. Official...
2 KB (103 words) - 18:21, 9 December 2024
Blockchain (section Structure and design)
forks are possible, blockchains may be considered secure by design and exemplify a distributed computing system with high Byzantine fault tolerance. A blockchain...
136 KB (13,228 words) - 21:03, 12 July 2025
Fuzzy Extractors and Cryptographically-Secure Physical Unclonable Functions," IEEE Transactions on Dependable and Secure Computing, January 2017. McGrath...
35 KB (4,103 words) - 13:09, 10 July 2025
Willy Susilo (section Publications and awards)
of IEEE Transactions on Dependable and Secure Computing (TDSC) and has served an Associate Editor of IEEE Transactions on Information Forensics and Security...
10 KB (837 words) - 21:32, 3 November 2024
". IEEE Transactions on Dependable and Secure Computing. 9 (6): 811–824. doi:10.1109/TDSC.2012.75. ISSN 1545-5971. S2CID 351844. "Measurement and Classification...
7 KB (696 words) - 03:37, 17 July 2025
Editor of IEEE Transactions on Information Theory, IEEE Transactions on Dependable and Secure Computing, and Transactions on Information and System Security...
7 KB (422 words) - 11:41, 11 November 2024
Wireless sensor network (redirect from Secure data aggregation in WSN)
Sensor Networks". 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). Cairo: IEEE. pp. 313–320. doi:10...
54 KB (6,458 words) - 20:13, 9 July 2025
Gail-Joon Ahn (category Fellows of the IEEE)
of the IEEE Transactions on Dependable and Secure Computing, an associate editor of ACM Transactions on Information and Systems Security and a member...
4 KB (324 words) - 17:16, 4 September 2024
Comprehensive Model for Software Rejuvenation", IEEE Transactions on Dependable and Secure Computing, 2 (2): 124–137, doi:10.1109/TDSC.2005.15, S2CID 15105513...
27 KB (2,821 words) - 12:12, 4 July 2025
Computer security (redirect from Securing a computer)
in computing security". RIT. Retrieved 13 October 2023. Misa, Thomas J. (2016). "Computer Security Discourse at RAND, SDC, and NSA (1958-1970)". IEEE Annals...
220 KB (22,295 words) - 11:20, 16 July 2025