Journals in DBLP
Kun Sun , Peng Ning , Cliff Wang Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:177-189 [Journal ] Irith Pomeranz , Sudhakar M. Reddy Concurrent Online Testing of Identical Circuits Using Nonidentical Input Vectors. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:190-200 [Journal ] Sandeep S. Kulkarni , Ali Ebnenasir Complexity Issues in Automated Synthesis of Failsafe Fault-Tolerance. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:201-215 [Journal ] Jelena Mirkovic , Peter L. Reiher D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:216-232 [Journal ] Haowen Chan , Virgil D. Gligor , Adrian Perrig , Gautam Muralidharan On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:233-247 [Journal ] Yair Amir , Cristina Nita-Rotaru , Jonathan Robert Stanton , Gene Tsudik Secure Spread: An Integrated Architecture for Secure Group Communication. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:248-261 [Journal ] Benjamin B. M. Shao Optimal Redundancy Allocation for Information Technology Disaster Recovery in the Network Economy. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:262-267 [Journal ] István Zsolt Berta , Levente Buttyán , István Vajda A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:268-272 [Journal ]