PDF) LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data
A Credibility Analysis System for Assessing Information on Twitter | IEEE Journals & Magazine | IEEE Xplore
Journal Rank IEEE Transactions on Information Forensics and Security 4* IEEE Transactions on Dependable and Secure Computing 4*
A Privacy Mechanism for Access Controlled Graph Data
Fatemah Alharbi | فاطمة الحربي on Twitter: "I'm thrilled to announce that our paper titled “DNS Poisoning of Operating System Caches: Attacks and Mitigations” is accepted at the IEEE Transactions on Dependable
IEEE Transactions on Dependable and Secure Computing template - For Authors
IEEE Transactions on Dependable and Secure Computing | IEEE Computer Society Digital Library
IEEE Transactions on Dependable and Secure Computing... | Exaly
Research – LIISP
PDF) Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks
IEEE Transactions on Dependable and Secure Computing | IEEE Computer Society Digital Library
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
Introduction to the IEEE Transactions on Dependable and Secure Computing
Tulip Lab | IEEE Transactions on Dependable and Secure Computing 2022 Acceptance
Dependable and Secure Computing - Impact Factor | S-Logix
Transaction / Regular Paper Title
PDF) Transactions on Dependable and Secure Computing Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments