• Dependable and Secure Computing," IEEE Transactions on Dependable and Secure Computing, vol. 1, pp. 11-33, 2004. "Dependable Systems and Networks". www...
    17 KB (2,055 words) - 14:07, 9 May 2025
  • The IEEE Transactions on Dependable and Secure Computing is a bimonthly peer-reviewed scientific journal covering all aspects of dependability and security...
    2 KB (82 words) - 16:38, 25 May 2024
  • Computers, IEEE Transactions on Consumer Electronics, IEEE Transactions on Control Systems Technology, IEEE Transactions on Dependable and Secure Computing, IEEE...
    19 KB (1,197 words) - 05:44, 13 July 2025
  • Byzantine fault (category Distributed computing problems)
    (2004). "Basic concepts and taxonomy of dependable and secure computing". IEEE Transactions on Dependable and Secure Computing. 1 (1): 11–33. doi:10.1109/TDSC...
    34 KB (4,058 words) - 16:43, 22 February 2025
  • Vulnerabilities of Existing Designs, and Countermeasures". IEEE Transactions on Dependable and Secure Computing (Website). 16 (6) (1st ed.): 1040–1053...
    38 KB (3,527 words) - 11:34, 24 June 2025
  • Thumbnail for Social media
    Twitter accounts: Are you a human, bot, or cyborg?". IEEE Transactions on Dependable and Secure Computing. 9 (6): 811–824. doi:10.1109/tdsc.2012.75. S2CID 351844...
    175 KB (21,514 words) - 13:42, 15 July 2025
  • Thumbnail for Computer worm
    Bagchi, S. (2008). "Modeling and Automated Containment of Worms". IEEE Transactions on Dependable and Secure Computing. 5 (2): 71–86. doi:10.1109/tdsc...
    24 KB (2,746 words) - 12:35, 11 July 2025
  • "Searchable Encryption over Feature-Rich Data". IEEE Transactions on Dependable and Secure Computing. 15 (3): 496–510. doi:10.1109/TDSC.2016.2593444....
    53 KB (6,653 words) - 07:07, 25 June 2025
  • Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds". 2018 IEEE Conference on Dependable and Secure Computing (DSC). pp. 1–4. doi:10.1109/DESEC...
    6 KB (897 words) - 03:10, 24 January 2025
  • Cryptography in Internet-Scale Systems: A Case Study on DNSSEC". IEEE Transactions on Dependable and Secure Computing. 8 (5). pp. 656–669. CiteSeerX 10.1.1.158.1984...
    64 KB (7,741 words) - 08:19, 9 March 2025
  • Lorenzo (July 2006). "Fast Byzantine Consensus" (PDF). IEEE Transactions on Dependable and Secure Computing. 3 (3): 202–215. doi:10.1109/TDSC.2006.35. Retrieved...
    63 KB (6,819 words) - 12:00, 30 June 2025
  • Delay-based Location Verification for the Internet" (PDF). IEEE Transactions on Dependable and Secure Computing. 14 (2): 130–144. CiteSeerX 10.1.1.696.691. doi:10...
    33 KB (3,312 words) - 05:01, 15 July 2025
  • Confidential computing is a security and privacy-enhancing computational technique focused on protecting data in use. Confidential computing can be used...
    47 KB (4,453 words) - 16:19, 8 June 2025
  • Checksums for Embedded Control Networks" (PDF). IEEE Transactions on Dependable and Secure Computing. RFC 3309 "Cbloom rants: 08-21-10 - Adler32". 21...
    10 KB (888 words) - 12:36, 4 July 2025
  • Thumbnail for Multi-factor authentication
    Beyond Attainment" (PDF). IEEE Transactions on Dependable and Secure Computing. Piscataway, New Jersey: Institute of Electrical and Electronics Engineers...
    43 KB (4,790 words) - 23:23, 16 July 2025
  • Thumbnail for Common Vulnerability Scoring System
    Scoring System be Trusted? A Bayesian Analysis". IEEE Transactions on Dependable and Secure Computing. 15 (6): 1002–1015. doi:10.1109/TDSC.2016.2644614...
    35 KB (3,387 words) - 21:35, 24 May 2025
  • Thumbnail for Cyborg
    Cyborg (category Commons category link is on Wikidata)
    Twitter Accounts: Are You a Human, Bot, or Cyborg?". IEEE Transactions on Dependable and Secure Computing. 9 (6): 811–824. doi:10.1109/TDSC.2012.75. S2CID 351844...
    102 KB (11,464 words) - 20:49, 11 July 2025
  • Thumbnail for Image sharing
    Decision: Control of Photo Sharing on Online Social Networks". IEEE Transactions on Dependable and Secure Computing. PP (99): 199–210. doi:10.1109/TDSC...
    30 KB (3,510 words) - 20:08, 25 June 2025
  • Fred B. Schneider (category Fellows of the IEEE)
    Computing Surveys, High Integrity Systems, IEEE Transactions on Dependable and Secure Computing, and Information Processing Letters. Schneider is a Fellow...
    10 KB (713 words) - 21:19, 23 October 2024
  • Checksums for Embedded Control Networks" (PDF). IEEE Transactions on Dependable and Secure Computing. J. Zweig, UIUC, C. Partridge, BBN (February 1990)...
    18 KB (2,587 words) - 22:57, 24 May 2025
  • CryptoVerif (category Official website different in Wikidata and Wikipedia)
    Sound Mechanized Prover for Security Protocols". IEEE Transactions on Dependable and Secure Computing. 5 (4): 193–207. doi:10.1109/TDSC.2007.1005. Official...
    2 KB (103 words) - 18:21, 9 December 2024
  • forks are possible, blockchains may be considered secure by design and exemplify a distributed computing system with high Byzantine fault tolerance. A blockchain...
    136 KB (13,228 words) - 21:03, 12 July 2025
  • Thumbnail for Physical unclonable function
    Fuzzy Extractors and Cryptographically-Secure Physical Unclonable Functions," IEEE Transactions on Dependable and Secure Computing, January 2017. McGrath...
    35 KB (4,103 words) - 13:09, 10 July 2025
  • Thumbnail for Willy Susilo
    of IEEE Transactions on Dependable and Secure Computing (TDSC) and has served an Associate Editor of IEEE Transactions on Information Forensics and Security...
    10 KB (837 words) - 21:32, 3 November 2024
  • ". IEEE Transactions on Dependable and Secure Computing. 9 (6): 811–824. doi:10.1109/TDSC.2012.75. ISSN 1545-5971. S2CID 351844. "Measurement and Classification...
    7 KB (696 words) - 03:37, 17 July 2025
  • Editor of IEEE Transactions on Information Theory, IEEE Transactions on Dependable and Secure Computing, and Transactions on Information and System Security...
    7 KB (422 words) - 11:41, 11 November 2024
  • Sensor Networks". 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS). Cairo: IEEE. pp. 313–320. doi:10...
    54 KB (6,458 words) - 20:13, 9 July 2025
  • Gail-Joon Ahn (category Fellows of the IEEE)
    of the IEEE Transactions on Dependable and Secure Computing, an associate editor of ACM Transactions on Information and Systems Security and a member...
    4 KB (324 words) - 17:16, 4 September 2024
  • Thumbnail for Theil–Sen estimator
    Comprehensive Model for Software Rejuvenation", IEEE Transactions on Dependable and Secure Computing, 2 (2): 124–137, doi:10.1109/TDSC.2005.15, S2CID 15105513...
    27 KB (2,821 words) - 12:12, 4 July 2025
  • Thumbnail for Computer security
    in computing security". RIT. Retrieved 13 October 2023. Misa, Thomas J. (2016). "Computer Security Discourse at RAND, SDC, and NSA (1958-1970)". IEEE Annals...
    220 KB (22,295 words) - 11:20, 16 July 2025