Found: 17
Select item for more details and to access through your institution.
Automated Derivation of Application-Aware Error Detectors Using Static Analysis: The Trusted Illiac Approach.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. 44, doi. 10.1109/TDSC.2009.23
- By:
- Publication type:
- Article
Soft Error Rate Analysis for Combinational Logic Using an Accurate Electrical Masking Model.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. 137, doi. 10.1109/TDSC.2009.29
- By:
- Publication type:
- Article
TDSC 2010 Annual Index.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. N.PAG, doi. 10.1109/TDSC.2011.5
- Publication type:
- Article
TDSC 2010 Reviewers List.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. 160, doi. 10.1109/TDSC.2011.6
- Publication type:
- Article
Cover2.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. c2, doi. 10.1109/TDSC.2011.21
- Publication type:
- Article
Cover4.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. c4, doi. 10.1109/TDSC.2011.4
- Publication type:
- Article
Cover3.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. c3, doi. 10.1109/TDSC.2011.3
- Publication type:
- Article
The Geometric Efficient Matching Algorithm for Firewalls.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. 147, doi. 10.1109/TDSC.2009.28
- By:
- Publication type:
- Article
Balancing Revocation and Storage Trade-Offs in Secure Group Communication.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. 58, doi. 10.1109/TDSC.2009.27
- By:
- Publication type:
- Article
An Obfuscation-Based Approach for Protecting Location Privacy.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. 13, doi. 10.1109/TDSC.2009.25
- By:
- Publication type:
- Article
Cover1.
- Published in:
- 2011
- Publication type:
- Table of Contents
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. 89, doi. 10.1109/TDSC.2009.22
- By:
- Publication type:
- Article
Deadlock-Free Adaptive Routing in Meshes with Fault-Tolerance Ability Based on Channel Overlapping.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. 74, doi. 10.1109/TDSC.2009.3
- By:
- Publication type:
- Article
Providing e-Transaction Guarantees in Asynchronous Systems with No Assumptions on the Accuracy of Failure Detection.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. 104, doi. 10.1109/TDSC.2009.2
- By:
- Publication type:
- Article
RITAS: Services for Randomized Intrusion Tolerance.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. 122, doi. 10.1109/TDSC.2008.76
- By:
- Publication type:
- Article
A Stochastic Model for Quantitative Security Analyses of Networked Systems.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. 28, doi. 10.1109/TDSC.2008.75
- By:
- Publication type:
- Article
A Distributed Algorithm for Finding All Best Swap Edges of a Minimum-Diameter Spanning Tree.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. 1, doi. 10.1109/TDSC.2009.17
- By:
- Publication type:
- Article