Scheduled System Maintenance:
On Wednesday, July 29th, IEEE Xplore will undergo scheduled maintenance from 7:00-9:00 AM ET (11:00-13:00 UTC). During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Dependable and Secure Computing, IEEE Transactions on

Issue 4 • Date Oct.-Dec. 2009

Filter Results

Displaying Results 1 - 12 of 12
  • [Front cover]

    Publication Year: 2009 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (187 KB)  
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2009 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (101 KB)  
    Freely Available from IEEE
  • A Novel Bicriteria Scheduling Heuristics Providing a Guaranteed Global System Failure Rate

    Publication Year: 2009 , Page(s): 241 - 254
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2545 KB) |  | HTML iconHTML  

    We propose a new framework for the (length and reliability) bicriteria static multiprocessor scheduling problem. Our first criterion remains the schedule's length, which is crucial to assess the system's real-time property. For our second criterion, we consider the global system failure rate, seen as if the whole system were a single task scheduled onto a single processor, instead of the usual rel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Top-Down Design Methodology for Ultrahigh-Performance Hashing Cores

    Publication Year: 2009 , Page(s): 255 - 268
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3751 KB) |  | HTML iconHTML  

    Many cryptographic primitives that are used in cryptographic schemes and security protocols such as SET, PKI, IPSec, and VPNs utilize hash functions, which form a special family of cryptographic algorithms. Applications that use these security schemes are becoming very popular as time goes by and this means that some of these applications call for higher throughput either due to their rapid accept... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chasing the Weakest System Model for Implementing Ω and Consensus

    Publication Year: 2009 , Page(s): 269 - 281
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (624 KB) |  | HTML iconHTML  

    Aguilera et al. and Malkhi et al. presented two system models, which are weaker than all previously proposed models where the eventual leader election oracle Omega can be implemented, and thus, consensus can also be solved. The former model assumes unicast steps and at least one correct process with f outgoing eventually timely links, whereas the latter assumes broadcast steps and at least one cor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is Asynchronous Logic More Robust Than Synchronous Logic?

    Publication Year: 2009 , Page(s): 282 - 294
    Cited by:  Papers (13)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2387 KB) |  | HTML iconHTML  

    With clock rates beyond 1 GHz, the model of a system wide synchronous clock is becoming difficult to maintain; therefore, asynchronous design styles are increasingly receiving attention. While the traditional synchronous design style is well-proven and backed up by a rich field experience, comparatively little is known about the properties of asynchronous circuits in practical application. In the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks

    Publication Year: 2009 , Page(s): 295 - 308
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1123 KB) |  | HTML iconHTML  

    Hybrid networks consisting of cellular and Wi-Fi networks were proposed as a high-throughput architecture for cellular services. In such networks, devices equipped with cellular and Wi-Fi network cards access Internet services through the cellular base station. The Wi-Fi interface is used to provide a better service to clients that are far away from the base station, via multihop ad hoc paths. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BLAST-SSAHA Hybridization for Credit Card Fraud Detection

    Publication Year: 2009 , Page(s): 309 - 315
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1217 KB) |  | HTML iconHTML  

    A phenomenal growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. In real life, fraudulent transactions are interspersed with genuine transactions and simple pattern ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI

    Publication Year: 2009 , Page(s): 316 - 320
    Cited by:  Papers (23)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1025 KB) |  | HTML iconHTML  

    Since RFID tags are ubiquitous and at times even oblivious to the human user, all modern RFID protocols are designed to resist tracking so that the location privacy of the human RFID user is not violated. Another design criterion for RFIDs is the low computational effort required for tags, in view that most tags are passive devices that derive power from an RFID reader's signals. Along this vein, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TDSC Information for authors

    Publication Year: 2009 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (101 KB)  
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2009 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (187 KB)  
    Freely Available from IEEE
  • 2009 Annual Index

    Publication Year: 2009 , Page(s): Not in Print
    Save to Project icon | Request Permissions | PDF file iconPDF (222 KB)  
    Freely Available from IEEE

Aims & Scope

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Elisa Bertino
CS Department
Purdue University