By Topic

IEEE Transactions on Dependable and Secure Computing

Issue 3 • Date July-Sept. 2004

Filter Results

Displaying Results 1 - 11 of 11
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2004, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Editor's note

    Publication Year: 2004, Page(s): 145
    Request permission for commercial reuse | PDF file iconPDF (36 KB) | HTML iconHTML
    Freely Available from IEEE
  • Comprehensive approach to intrusion detection alert correlation

    Publication Year: 2004, Page(s):146 - 169
    Cited by:  Papers (131)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1632 KB) | HTML iconHTML

    Alert correlation is a process that analyzes the alerts produced by one or more intrusion detection systems and provides a more succinct and high-level view of occurring or attempted intrusions. Even though the correlation process is often presented as a single step, the analysis is actually carried out by a number of components, each of which has a specific goal. Unfortunately, most approaches to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identity-based fault-tolerant conference key agreement

    Publication Year: 2004, Page(s):170 - 178
    Cited by:  Papers (13)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    Lots of conference key agreement protocols have been suggested to secure computer network conference. Most of them operate only when all conferees are honest, but do not work when some conferees are malicious and attempt to delay or destruct the conference. Recently, Tzeng proposed a conference key agreement protocol with fault tolerance in terms that a common secret conference key among honest co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An on-chip signal suppression countermeasure to power analysis attacks

    Publication Year: 2004, Page(s):179 - 189
    Cited by:  Papers (46)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB) | HTML iconHTML

    There are several attacks that exploit the presence of side channels in hardware implementations of cryptographic algorithms to extract secret data. Differential power analysis (DPA) and simple power analysis (SPA) attacks sense the power consumption of the hardware to extract the secret cryptographic key. These attacks either directly examine the power traces or carry out statistical operations o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisement]

    Publication Year: 2004, Page(s): 190
    Request permission for commercial reuse | PDF file iconPDF (374 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2004, Page(s): 191
    Request permission for commercial reuse | PDF file iconPDF (663 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2004, Page(s): 192
    Request permission for commercial reuse | PDF file iconPDF (513 KB)
    Freely Available from IEEE
  • TDSC Information for authors

    Publication Year: 2004, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2004, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University