Advanced Search 
IEEE Transactions on Dependable and Secure Computing
March-April 2013 (vol. 10 no. 2)
ISSN: 1545-5971
Table of Contents
Papers
Di Ma, Coll. of Eng. & Comput. Sci, Univ. of Michigan-Dearborn, Dearborn, MI, USA
N. Saxena, Comput. & Inf. Sci. Dept., Univ. of Alabama at Birmingham, Birmingham, AL, USA
Tuo Xiang, Coll. of Eng. & Comput. Sci, Univ. of Michigan-Dearborn, Dearborn, MI, USA
Yan Zhu, Coll. of Eng. & Comput. Sci, Univ. of Michigan-Dearborn, Dearborn, MI, USA
pp. 57-69
Zhiyong Shan, Dept. of Comput. Sci., Renmin Univ. of China, Beijing, China
Xin Wang, Dept. of Electr. & Comput. Eng., Stony Brook Univ., Stony Brook, NY, USA
Tzi-cker Chiueh, Dept. of Comput. Sci., Stony Brook Univ., Stony Brook, NY, USA
pp. 70-83
J. Freudiger, Sch. of Comput. & Commun. Sci., EPFL, Lausanne, Switzerland
M. H. Manshaei, Dept. of Electr. & Comput. Eng., Isfahan Univ. of Technol., Isfahan, Iran
Jean-Pierre Hubaux, Sch. of Comput. & Commun. Sci., EPFL, Lausanne, Switzerland
D. C. Parkes, Sch. of Eng. & Appl. Sci. (SEAS), Harvard Univ., Cambridge, MA, USA
pp. 84-98
J. Biskup, Fak. fur Inf., Tech. Univ. Dortmund, Dortmund, Germany
Lan Li, Sch. of Inf. Security Eng., Shanghai Jiao Tong Univ., Shanghai, China
pp. 99-113
Lide Duan, AMD, Inc., Austin, TX, USA
Lu Peng, Div. of Electr. & Comput. Eng., Louisiana State Univ., Baton Rouge, LA, USA
Bin Li, Dept. of Exp. Stat., Louisiana State Univ., Baton Rouge, LA, USA
pp. 114-127
Usage of this product signifies your acceptance of the Terms of Use.