A

  • A5/1 Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • ABAC A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]

  • ABPNN-MLPQS An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Access Control A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]

  • Access Control Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

  • Access Control A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • Access Control A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]

  • Access Control Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

  • Access Control A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]

  • Access Control Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]

  • Access Control Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Access Control IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]

  • Access Control Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]

  • Access Control Policies An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

  • Access Control Policy (ACP) A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]

  • Access Policy Update HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]

  • Accountability A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]

  • Active S-box 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]

  • Active S-box New Directions in the Design of Binary Matrices for SPN Block Ciphers [Volume 15, Issue 3, 2023, Pages 129-138]

  • Adaptive Timeout Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]

  • Ad Hoc Network A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • ADL Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]

  • Advanced Persistent Threat Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]

  • Adversarial Machine Learning Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]

  • AES Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

  • AES Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]

  • Agent-based modeling A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]

  • AI Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Airport A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]

  • Alert Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Alert Correlation Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Alert Correlation Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

  • Algebraic Matching Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • Algebraic Resolution Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • Alternating Cycle Free Matching On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

  • Android Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]

  • Android Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

  • Android Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]

  • Android Malware Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

  • Android Malware Detection Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

  • Android Security SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]

  • Android Security Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]

  • Anomaly A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]

  • Anomaly Detection STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]

  • Anomaly Detection F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • Anonymity Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

  • Anonymity of Voter Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Anonymous Attribute-Based Encryption HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]

  • ANP DEMATEL A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]

  • AODV A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • API Call DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]

  • Applied Cryptography An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]

  • Applied pi Calculus Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]

  • Arabic E-Text High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]

  • Architecture Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

  • ARIMA Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]

  • ARM Architecture Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]

  • Artemia Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Artificial Bee Colony BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

  • Artificial Immune Systems STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]

  • Artificial Intelligence-based Code Review Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]

  • ASIC Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]

  • Attack Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Attack Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]

  • Attacker Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Attack resistance A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]

  • Attack Scenario Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Attack Scenario A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]

  • Attribute-Based Authentication Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]

  • Attribute-Based Cryptography Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]

  • Attribute-Based Encryption Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Attribute-Based Encryption Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

  • Attribute-Based Encryption Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]

  • Attribute-Based Searchable Encryption Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

  • Attributed Function Call Graph Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

  • Attribute Revocation Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]

  • Audio scrambling system Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • Authenticated Cipher CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • Authenticated Encryption Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Authenticated Encryption Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Authentication Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Authentication Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]

  • Authentication Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

  • Authentication A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • Authentication Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

  • Authentication A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

  • Authentication and Non-repudiation An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]

  • Authentication Code Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]

  • Authentication Protocol A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]

  • Authorization CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]

  • Authorization Model Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

  • Autoencoder A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]

  • Automated Identification Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer [Volume 12, Issue 3, 2020, Pages 73-79]

  • Automated Testing An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

  • AVISPA A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • AVISPA GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • AV-Net Mask Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]

B

  • Backpropagation An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Bag-Of-Visual-Words (BOVW) File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]

  • BAN logic A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • Batch and Online Learning Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]

  • Batch authentication A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

  • Battery Consumption On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

  • Behavior Algebra Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • Behavioral Patterns of Web Visitors A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

  • Belief Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]

  • Big Data Knowledge Discovery in Cloud-Computing Environment and the Challenges [Volume 12, Issue 3, 2020, Pages 95-99]

  • Bilateral Authentication A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

  • Bilinear Pairing Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • Bilinear Pairing New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]

  • Binary-mapped Historical-memory Management F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • Binary Matrix New Directions in the Design of Binary Matrices for SPN Block Ciphers [Volume 15, Issue 3, 2023, Pages 129-138]

  • Binary Relevance A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]

  • Biometric Encryption A collusion attack on the fuzzy vault scheme [Volume 1, Issue 1, 2009, Pages 27-34]

  • Biometric Recognition Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

  • Biometric system The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]

  • Bit-parallel Multiplier Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]

  • BKZ Simulation Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Blind Access Policy HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]

  • Blindness An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]

  • Blind Signature An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]

  • Blind Signature Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Blind Signature An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Blind Steganalysis An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]

  • Blockchain Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Blockchain On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

  • Blockchain Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]

  • Blockchain Safety Guards for Ethereum Smart Contracts [Volume 16, Issue 1, 2024, Pages 37-53]

  • Blockchain Privacy An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]

  • Blockchain Voting An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]

  • Botnet Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

  • Botnet Detection BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]

  • Botnet Detection BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]

  • Botnet Lifecycle BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]

  • Botnet Life-Cycle BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]

  • BPEL A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]

  • Branch number Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Broadcast Authentication Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]

  • Broadcast Channel Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]

  • Broadcast Encryption Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]

  • Broken Authentication Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]

  • Business Intelligence Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Business Process Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]

  • Byzantine-resilience Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]

C

  • CAESAR Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • CAESAR Competition Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Capacity A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications [Volume 5, Issue 1, 2013, Pages 5-36]

  • CAPTCHA Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

  • CAPTCHA Security Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

  • CAPTCHA Usability Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

  • CBIR Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]

  • Cellular Network An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]

  • Certificateless Signcryption An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]

  • Certificateless Signcryption Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]

  • Certificateless Signcryption Scheme An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]

  • Channel Coding An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

  • Chaos Theory Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

  • Chaotic Maps A Chaos-Based Video Watermarking Algorithm [Volume 4, Issue 1, 2012, Pages 77-86]

  • Chaotic Tent Map Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]

  • Characteristic Function Moments An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]

  • Chatbot A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]

  • ChatGPT Model Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]

  • Chebychev Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]

  • Checkability Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]

  • Chinese Remainder Theorem Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]

  • CiliPadi Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Cipher text only attack Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • Classification A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]

  • Clickable CAPTCHA Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

  • Clock Tree Construction Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]

  • Closest Vector Problem On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

  • Cloud Computing Latest Threats Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Computing Security Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Computing Threats Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Forensic Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics [Volume 13, Issue 3, 2021, Pages 49-57]

  • Cloud Security Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics [Volume 13, Issue 3, 2021, Pages 49-57]

  • Cloud Security Countermeasures Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Security State-of-the-Art Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Security Taxonomy Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]

  • Cloud Server On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Cloud Storage Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Clustering A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]

  • Clustering OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Clustering CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]

  • Clustering A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]

  • CLΟCv₁ Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • CNN Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • CNN Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]

  • Code Based Cryptography An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

  • Code-Based Cryptosystem Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]

  • Code Injection Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

  • Code Reuse Attack Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]

  • Code Reuse Attacks Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

  • Coding A New Derivation of the Leftover Hash Lemma [Volume 12, Issue 3, 2020, Pages 55-58]

  • Coding Guidelines Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

  • Coding Theory Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]

  • Coefficient Vector Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Collusion A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]

  • COLM CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • Colored-Petri-Nets Model Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

  • Combination of Data Hiding and Cryptography Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

  • Combinatorial Optimization Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

  • Command and Control Channel BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]

  • Common Weakness Enumeration Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]

  • Companion matrix Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Computational Complexity On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

  • Computer Security Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]

  • Computer Systems Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]

  • Concentration measure Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]

  • Confidence A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • Confidence Estimation A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • Confidentiality A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • Confidentiality SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

  • Configurable Look Up Tables(CFGLUTs) An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]

  • Consensus Algorithm Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]

  • Constant Number of Pairings Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

  • Constrained Policy Graph (CPG) A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]

  • Contactless Smart Card Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • Content-Based Image Retrieval(CBIR) OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Contention-based Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]

  • Context-Aware A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]

  • Context Awareness CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]

  • Contingency Logic Distributed Contingency Logic and Security [Volume 10, Issue 2, 2018, Pages 107-115]

  • Continuous Non-malleability A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]

  • Contourlet Transform An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]

  • Controllable point Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]

  • Controllable point Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • Convertible Limited (Multi-) Verifier Signature Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • Convolution Neural Networks Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]

  • Correctness Verification A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]

  • Correlation Matrix Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

  • Cost-Sensitive Attack Graph A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]

  • Countermeasure A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]

  • CPA CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • CPA Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • CPU Register Values DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]

  • CRAFT Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]

  • Credential Stuffing Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]

  • Critical Degrees of Freedom On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]

  • Critical success factors Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Critical Success Factors (CSF) Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]

  • Cross-Device Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]

  • Cross Site Scripting Cross Site Scripting Attack Review [Volume 13, Issue 3, 2021, Pages 21-30]

  • Cryptanalysis Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • Cryptanalysis Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]

  • Cryptanalysis Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Cryptanalysis New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]

  • Cryptocurrency Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]

  • Cryptographic Protocols A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]

  • Cryptography A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Cryptography Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]

  • Cryptology Stream ciphers and the eSTREAM project [Volume 2, Issue 1, 2010, Pages 3-11]

  • CTRU NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]

  • Cube Attack Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]

  • Curious-Monkey Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

  • Cyber-attack A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]

  • Cybersecurity Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

  • Cyber Security A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]

  • Cyber Security Cross Site Scripting Attack Review [Volume 13, Issue 3, 2021, Pages 21-30]

D

  • D2D communications An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]

  • Danger Theory STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]

  • Data Auditing Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]

  • Data Augmentation Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]

  • Database-Driven CRN Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]

  • Database Outsourcing Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]

  • Database Outsourcing A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]

  • Database Security A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]

  • Database Security Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]

  • Database Security A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing [Volume 11, Issue 1, 2019, Pages 3-14]

  • Data-Distribution-Service Middleware Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

  • Data hiding A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications [Volume 5, Issue 1, 2013, Pages 5-36]

  • Data Integration Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Data Integrity Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems [Volume 14, Issue 3, 2022, Pages 43-49]

  • Data mining Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]

  • Data mining Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]

  • Data mining Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]

  • Data Outsourcing SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]

  • Data Outsourcing SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

  • Data Reduction Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]

  • Data Reduction Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]

  • Data stream algorithm F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • Data Virtualization Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Data Warehouse (Star Schema) Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]

  • Dates Fruits Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]

  • DBSCAN A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

  • DCGAN Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]

  • DDoS Attack Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]

  • DDoS detection F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • Decision support system A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]

  • Dedekind Domain EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

  • Deep Learning Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • Deep Learning Data Enhancement for Date Fruit Classification Using DCGAN [Volume 13, Issue 3, 2021, Pages 39-48]

  • Deep Learning Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]

  • Deep Learning A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]

  • Deep Learning Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]

  • Deep seq2seq network Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]

  • Deniable Authentication Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • Density Based Clustering A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

  • Deoxys-BC Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Department of Motor Vehicles(DMV) A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

  • Desynchronization Attack A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]

  • Difference Families Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]

  • Differential Attack Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]

  • Differential Cryptanalysis A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]

  • Differential Fault Analysis Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • Differential Fault Analysis Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]

  • Differential Fault Analysis Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]

  • Differential Privacy Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]

  • Diffie-Hellman A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • Diffie-Hellman problem New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]

  • Diffusion layer Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Diffusion layer 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]

  • Diffusion layer New Directions in the Design of Binary Matrices for SPN Block Ciphers [Volume 15, Issue 3, 2023, Pages 129-138]

  • Digital Evidence Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]

  • Digital Forensic Forensic-Enabled Security as a Service (FESaaS) - A Readiness Framework for Cloud Forensics [Volume 13, Issue 3, 2021, Pages 49-57]

  • Digital Forensic Artifacts Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]

  • Digital Forensics Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]

  • Digital Forensics File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]

  • Digital Signature Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]

  • Digital Signature Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]

  • Digital Steganography Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]

  • Discrete Imperialist Competitive Algorithm Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

  • Discrete Logarithm New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]

  • Discrete Wavelet transform Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]

  • Dispersion measure Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]

  • Distinguisher Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Distinguishing Attack Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Distinguishing Attacks On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]

  • Distributed Cloud On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

  • Distributed Contingency Distributed Contingency Logic and Security [Volume 10, Issue 2, 2018, Pages 107-115]

  • Distributed Pixel A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]

  • Distributed Systems On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

  • Division Property Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]

  • DL Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]

  • DNA Motif CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]

  • DOM CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • Double Random Phase Encoding (DRPE) Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

  • DPA A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]

  • DSS A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]

  • DT The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]

  • DTW Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]

  • DWT Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Dynamic analysis DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]

  • Dynamic analysis Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

  • Dynamic analysis A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

  • Dynamic Environment Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

  • Dynamic Permission-Activation A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]

  • Dynamic Role-Assignment A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]

  • Dynamic testing Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]

E

  • Eavesdropper Attack On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • ECDLP An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Edge Computing IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • Efficiency An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]

  • E-Health An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]

  • EHR Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Eigenvalues Analysis Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

  • Electronic health record Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Electronic Voting Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • Electronic Voting Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Electronic Voting An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]

  • Elliptic Curve Cryptography Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]

  • Elliptic Curve Cryptography Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]

  • Elliptic Curve Cryptography Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]

  • Elliptic Curve Cryptography An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]

  • Elliptic Curves New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]

  • Elliptic Curves Cryptosystems An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]

  • Embedded Systems Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

  • Embedding Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]

  • EMF ECORE Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Empirical Matrix Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]

  • Encrypted Database Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]

  • Encrypted traffic Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]

  • Encryption QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

  • Encryption Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]

  • End to End Delay Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • Ensemble A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]

  • Ensemble Clustering A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]

  • Ensemble Learning Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]

  • Entepreneurial Influencers Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]

  • Enterprise Resource Planning Systems (ERPs) Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]

  • Entity Authentication A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

  • Entrepreneurship Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]

  • EPC C1 G2 Standard Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

  • Ethereum Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • ETL Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • EV1 Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • Ev2 Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • EV3 Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • Evasion methods A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

  • Event Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]

  • Event Aggregation Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]

  • Event Generator Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

  • Evict+Time attack Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]

  • Evidence Theory Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]

  • Evolutionary Fuzzy System A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]

  • EWMA techniques Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]

  • Expected Profile Update Time F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

F

  • Facial Image The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]

  • Fairness Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

  • Fairness A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Fake Accounts Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]

  • Fast Decryption HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]

  • Feature Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Feature Coding High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]

  • Feature Extraction Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]

  • Feature Extraction OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Feature Extraction Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]

  • Feature Line Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]

  • Feature selection Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]

  • Federated Learning Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]

  • Field Programmable Gate Array Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]

  • Field Programmable Gate Array Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • File Type Classification File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]

  • Finite Fields NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]

  • Fixed Parameter Tractable On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

  • Fixed Point Attack New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]

  • FLD A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]

  • Flooding attack Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]

  • Flush+Reload attack Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

  • Fog Computing IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • Forcing Number On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

  • Forgery Attack Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Forgery Attack Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]

  • Formal A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]

  • Formal Methods Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]

  • Formal Methods Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]

  • Forward Secrecy A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]

  • Forward Traceability Attack Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

  • FPGA Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose [Volume 8, Issue 1, 2016, Pages 53-60]

  • FPGA Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • FPGA Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]

  • FPGA‎ A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

  • Fractal Image Generation Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

  • Fractional-order systems Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

  • Fragile Watermarking Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]

  • Fragile Watermarking A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]

  • Frequency Domain Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]

  • Fuzzy Histogram Equalization Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer [Volume 12, Issue 3, 2020, Pages 73-79]

  • Fuzzy Inference System(FIS) Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Fuzzy Rule Extraction A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]

  • Fuzzy Vault A collusion attack on the fuzzy vault scheme [Volume 1, Issue 1, 2009, Pages 27-34]

G

  • GAGE Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Game Design Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]

  • Garbled Circuits MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]

  • Generalized Jacobians Oblivious Transfer Using Generalized Jacobian of Elliptic Curves [Volume 15, Issue 2, 2023, Pages 260-273]

  • Generative adversarial network An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]

  • Genetic algorithm Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

  • Genetic Algorithm Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]

  • Genetic Algorithms Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Geometric Transformation SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Gesture recognition Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]

  • GGH EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

  • Glitch Frequency Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]

  • Glitch Frequency Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]

  • GMW Protocol MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]

  • GNR Enumeration Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • GNS3 Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]

  • Goal/Question/Metric paradigm (GQM) Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]

  • Gossip Algorithm GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

  • Gost2 Block Cipher New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]

  • Graded Discrete-Logarithm Problem A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes [Volume 14, Issue 1, 2022, Pages 1-11]

  • Graph Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Graph Coloring LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

  • Graph Convolutional Layer Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

  • Graphic Design Applications Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications [Volume 4, Issue 2, 2012, Pages 137-150]

  • Group GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]

  • Group-based handover authentication GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • Group Based P2P Systems GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

  • Group Based Reputation GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

  • Grouping Proof A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]

  • GSM A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

  • GTrust GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]

  • Guess-and-determine Attack On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

H

  • Hamming Code Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]

  • Hamming Code A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]

  • Hand gesture classification Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]

  • Handover Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

  • Hard Problems New Variations of Discrete Logarithm Problem [Volume 15, Issue 3, 2023, Pages 91-100]

  • Hardware Security Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]

  • Hardware Security ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]

  • Hardware Security An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]

  • Hardware Security HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]

  • Hardware Security Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]

  • Hardware Security, IP Protection, Security Path Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose [Volume 8, Issue 1, 2016, Pages 53-60]

  • Hardware Trojan Horses (HTHs) An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]

  • Hash Lemma A New Derivation of the Leftover Hash Lemma [Volume 12, Issue 3, 2020, Pages 55-58]

  • Heterogeneous Event Logs Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]

  • Heterogeneous Network An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]

  • Heterogeneous Sensor Networks A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]

  • Heuristic Algorithm BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]

  • Hidden Markov Model Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

  • Hidden Policy Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

  • Hierarchical Deterministic Wallets Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Hierarchical Identity-Based Searchable Encryption Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]

  • Hierarchical Threshold Access Structure A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • High-throughput Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]

  • HIP Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

  • History Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]

  • Homomorphic Encryption Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]

  • Homomorphic Encryption Private Federated Learning: An Adversarial Sanitizing Perspective [Volume 15, Issue 3, 2023, Pages 67-76]

  • Homomorphic hash function A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

  • Host-Based Intrusion Detection BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]

  • HTTP IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • HTTP Protocol Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]

  • Hyperelliptic Curve An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]

I

  • ID-based Framework An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Identity-Based Cryptography Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]

  • Identity-Based Encryption Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]

  • Identity-Based Encryption Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]

  • IDS Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • IDSS A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]

  • IEEE 802.11ac Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • IEEE 802.11b Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • IEEE 802.15.4 Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • Image CAPTCHA Image flip CAPTCHA [Volume 1, Issue 2, 2009, Pages 105-123]

  • Image Encryption Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]

  • IMAGE RECONSTRUCTION A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]

  • Image Watermarking Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Imbalanced Classes Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]

  • Imbalanced Classes Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]

  • Implementation of Access Control An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

  • Implementation of Fault Attack Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher [Volume 14, Issue 3, 2022, Pages 21-31]

  • Impossible Differential Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Impossible Differential Cryptanalysis A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]

  • Inclusive memory Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]

  • Indexed View Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]

  • Industrial Control Systems A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]

  • Information Flow Control CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]

  • Information Imperfection Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]

  • Information Propagation A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]

  • Information Quality (SYSQ) The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • Information System Success Model The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • InGAGE Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Insecure Direct Object Reference (IDOR) IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]

  • Instrumentation-Professional Skills The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]

  • Integral Distinguisher Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]

  • Intelligent Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Intelligent Applications An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]

  • Intelligent decision support system A Comparison Study between Intelligent Decision Support Systems and Decision Support Systems [Volume 11, Issue 3, 2019, Pages 187-194]

  • Interdependent Security Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]

  • Internal State Transition Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • Internet Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]

  • Internet of Medical Things An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]

  • Internet of Things A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]

  • Internet of Things IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • Internet of Things A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

  • Internet of Things Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

  • Internet of Things (IoT) Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

  • Internet of Things(IoT) Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) [Volume 11, Issue 3, 2019, Pages 153-160]

  • Inter-Transaction Dependency A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]

  • Inter-Transaction Sequence A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]

  • Intrusion Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Intrusion Detection A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]

  • Intrusion Detection Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]

  • Intrusion Detection Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

  • Intrusion Detection BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

  • Intrusion Detection A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]

  • Intrusion Detection Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]

  • Intrusion Detection A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • Intrusion Detection System Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach [Volume 4, Issue 2, 2012, Pages 125-136]

  • Intrusion Detection System A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]

  • Intrusion Detection System A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]

  • Intrusion Detection System A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach [Volume 15, Issue 3, 2023, Pages 43-50]

  • Intrusion Kill Chain Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]

  • IoT Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

  • IoT Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • IoT GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • IoT Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • IoT Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]

  • IoT Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]

  • IoT devices Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • IoT devices The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]

  • IP Piracy ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]

  • IP Protection HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]

  • IT Security A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]

J

  • J48 The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]

  • JavaScript A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]

  • Jigsaw puzzle Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • Julia Set Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

  • Jump Number On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

  • Jump Oriented Programming Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

K

  • Kashida High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]

  • Kermeta Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Kernel Trapper Gadget Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

  • Key Agreement Protocol Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]

  • Key Image Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]

  • Key Management An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]

  • Key Management A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]

  • Key Management System Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]

  • Key-Value Database SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

  • Keyword Guessing Attack Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

  • Knowledge discovery Knowledge Discovery in Cloud-Computing Environment and the Challenges [Volume 12, Issue 3, 2020, Pages 95-99]

  • Knowledge Distillation Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]

  • Knowledge Management Knowledge Discovery in Cloud-Computing Environment and the Challenges [Volume 12, Issue 3, 2020, Pages 95-99]

  • Knowledge Representation Considering Uncertainty in Modeling Historical Knowledge [Volume 11, Issue 3, 2019, Pages 59-65]

  • KSSTIS Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]

L

  • Laplacian Distribution Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling [Volume 8, Issue 2, 2016, Pages 131-139]

  • Lattice-based Cryptography EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

  • Lattice-based Cryptography On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

  • Lattice-based Cryptography NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]

  • Lattice Based cryptography A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]

  • LBlock A new method for accelerating impossible differential cryptanalysis and its application on LBlock [Volume 8, Issue 1, 2016, Pages 73-84]

  • Leakage-resilient A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]

  • Learning Platform The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]

  • Learning Resilience HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]

  • Lightning Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]

  • Lightweight Block Cipher Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]

  • Lightweight cryptographic primitives Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • Linear Algebra Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

  • Linear Attack Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]

  • Literature Review Critical Success Factors for Data Virtualization: A Literature Review [Volume 11, Issue 3, 2019, Pages 131-137]

  • Location Privacy Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network [Volume 14, Issue 2, 2022, Pages 215-227]

  • Long Short Term Memory Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • Long-Term Context A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]

  • Low-Density Parity-Check Codes Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]

  • Lowpass Filter Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]

  • Low Rank Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

  • LRU replacement policy Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]

  • LSB Embedding Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

  • LSH The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]

  • LSTM Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • LSTM Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]

  • Lumped-element Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]

M

  • M2M communication GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • Machine Learning Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Machine Learning Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]

  • Machine Learning A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]

  • Machine Learning A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

  • Machine Learning Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]

  • MAC protocols Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]

  • Malicious-but-passive Key Generation Center Attack An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]

  • Malicious Code Detection A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]

  • Malicious Node A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • Malicious URLs Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]

  • Malicious web pages Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Malware Detection DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]

  • Malware Detection Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach [Volume 14, Issue 3, 2022, Pages 81-92]

  • Management information systems The Impact of The Biometric System on Election Fraud Elimination: Case of The North of IRAQ [Volume 11, Issue 3, 2019, Pages 195-207]

  • Mandatory Access Control CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]

  • Mandolrot Set Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

  • Man-in-the-Middle Attack A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

  • Matrix Rings NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]

  • Maximum Likelihood Decoding Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]

  • Maximum Likelihood Decoding Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling [Volume 8, Issue 2, 2016, Pages 131-139]

  • MDS matrix Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives [Volume 11, Issue 1, 2019, Pages 35-46]

  • MDS matrix 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]

  • Measurement Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]

  • Mechanism Design A Decentralized Online Sortition Protocol [Volume 10, Issue 1, 2018, Pages 63-69]

  • Medical System A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

  • Meet in the Middle New Fixed Point Attacks on GOST2 Block Cipher [Volume 11, Issue 2, 2019, Pages 145-158]

  • Membership Inference Attack An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]

  • Memory de-duplication Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

  • Message Recovery An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Metagraph GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]

  • Microaggregation A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]

  • Microaggregation Improved Univariate Microaggregation for Integer Values [Volume 12, Issue 1, 2020, Pages 35-43]

  • Microcalcifications Breast Cancer Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer [Volume 12, Issue 3, 2020, Pages 73-79]

  • Microwave Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]

  • Middleware Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

  • Midori Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]

  • MIFARE DESFire Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • MILP Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]

  • Minimization Analysis A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]

  • MITM Attack Distributed Contingency Logic and Security [Volume 10, Issue 2, 2018, Pages 107-115]

  • Mobile Ad Hoc Network BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

  • Mobile ad-hoc Networks A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]

  • Mobile Communication A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Mobile Communication An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]

  • Mobile Payment The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • Mobile Security SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]

  • Model Based Technique An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

  • Model Checking A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]

  • Model-driven engineering Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Model-Selection A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]

  • Model transformation Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Modes of Operation Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Modified Parse Tree Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]

  • Monkey Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

  • Monte Carlo Integration BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

  • MQTT IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • Multi-access Edge Computing Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]

  • Multi _ Chi-square Test On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]

  • Multi-class Classification Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]

  • Multi-Cloud SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

  • Multi-core processing Hand Gestures Classification with Multi-Core DTW [Volume 11, Issue 3, 2019, Pages 91-96]

  • Multi-homing Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

  • Multi-Keyword Searching Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]

  • Multilayer Fuzzy logic Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Multilevel An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Multi-level Priority Queue Scheduling An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Multilevel Security CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]

  • Multimedia encryption systems Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • Multi Objective Decision Making Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

  • Multi-path TCP Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

  • Multiple Access Channel One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]

  • Multiple Access Channel Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]

  • Multiple Byte Fault Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • Multiplicative Video Watermarking Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]

  • Multiresolution Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Multi-Secret Sharing A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Multi-secret Sharing Scheme Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]

  • Multi-Stage Secret Sharing A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Multi-stage Secret Sharing Scheme Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]

  • Multistep Attack Scenario Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

  • Mutual Information One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]

  • Mutual Information Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]

N

  • Nash equilibrium Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]

  • Natural Language A Multilingual Infobot in Airports [Volume 12, Issue 3, 2020, Pages 111-115]

  • Negative Selection BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

  • Netlist Encryption ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]

  • Networking Infrastructure Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]

  • Network Intrusion Detection Systems Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network [Volume 12, Issue 3, 2020, Pages 37-44]

  • Network management Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]

  • Network management Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]

  • Network Security GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • Network Security Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]

  • Neural Net Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]

  • Neural Network Model Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]

  • Neural Networks An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Nibble Fault Injection Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]

  • NIST lightweight cryptography competition Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • NO Editorial [Volume 11, Issue 3, 2019]

  • No Keywords Persian Abstract [Volume 8, Issue 1, 2016, Pages 85-90]

  • No Keywords Persian Abstract [Volume 9, Issue 1, 2017, Pages 93-98]

  • NOMA A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Non-homogeneous linear recursions A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Non-malleable A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]

  • Non-Monotonic Logic A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]

  • NoSQL SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

  • NP-complete On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

  • NTRU QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

O

  • Obfuscation ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]

  • Obfuscation Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Obfuscation An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]

  • Oblivious Transfer MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]

  • Oblivious Transfer Oblivious Transfer Using Generalized Jacobian of Elliptic Curves [Volume 15, Issue 2, 2023, Pages 260-273]

  • Observable points Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]

  • Observable points Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • One Class Classification Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]

  • One-Class Classification Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

  • Online Clustering BotOnus: an online unsupervised method for Botnet detection [Volume 4, Issue 1, 2012, Pages 51-62]

  • Online Feature Selection A Graph-based Online Feature Selection to Improve Detection of New Attacks [Volume 14, Issue 2, 2022, Pages 115-130]

  • Online/Offline Encryption HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [Volume 16, Issue 1, 2024, Pages 93-114]

  • Online Social Network A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • Open Source Hardware HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks [Volume 15, Issue 3, 2023, Pages 109-115]

  • O-PSI On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Optimal Bounding Function Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Optimistic Fair Exchange A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]

  • Order-Preserving Encryption SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]

  • Otsu’s threshold (OT) OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Ouafi-Phan Privacy Model Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

  • Outsourced Data Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]

  • Outsourced Decryption Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

  • Outsourcing Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]

  • OWASP Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study [Volume 13, Issue 3, 2021, Pages 59-67]

  • OWSAP Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

P

  • Packet Tracer Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • Packet Tracer The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]

  • Pair-wise Least Significant Bit matching Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

  • PAKE A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]

  • Parallel Sessions Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]

  • Partial Reconfiguration A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

  • Particle Swarm Optimization A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]

  • Password Spraying Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]

  • Path diversity Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

  • Pattern mining Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]

  • Payload methods A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

  • Peer to Peer Network GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

  • Pentanomials Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]

  • Perceptibility of Double Voting Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Perceptrons Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]

  • Performance Evaluation Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

  • Persian Abstract Persian Abstract [Volume 7, Issue 2, 2015, Pages 167-172]

  • Personal Privacy A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]

  • Perturbed Quantization (PQ) Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]

  • Pervasive Computing Environment A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]

  • Pervasive Computing Environment A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]

  • PFSC Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Phishing Detection Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]

  • Physical Layer Security Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]

  • PID Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]

  • PIPEDA Privacy Laws A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]

  • Pixel-Value Differencing Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]

  • Plan Recognition Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

  • Point Factorization problem An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]

  • Polar Codes An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

  • Policy control Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]

  • Polynomial Representation EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

  • Position Based Cryptography A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]

  • Power allocation A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Power Sensor Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • Precomputed Table Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • Preimage attack Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Priority Scheduling An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling [Volume 11, Issue 3, 2019, Pages 145-151]

  • Privacy A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • Privacy Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Privacy Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

  • Privacy Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

  • Privacy Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]

  • Privacy Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

  • Privacy Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols [Volume 14, Issue 2, 2022, Pages 157-165]

  • Privacy An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]

  • Privacy Preserving Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]

  • Privacy Preserving A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications [Volume 11, Issue 2, 2019, Pages 113-128]

  • Privacy Preserving A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

  • Privacy-Preserving Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]

  • Privacy-Preserving Applications MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]

  • Privacy Preserving Data Publishing A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]

  • Private-key Cryptosystem Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]

  • Private Key Search Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]

  • Private Set Intersection (PSI) On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Probabilistic equation Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]

  • Probabilistic Key Sharing An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]

  • Probabilistic Key Sharing LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

  • Process Algebra Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]

  • Professionalization The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case [Volume 12, Issue 3, 2020, Pages 87-93]

  • PROFILE The Use of Local Sensitive Hashing for E-learner Face Identification [Volume 12, Issue 3, 2020, Pages 1-5]

  • Profiled attacks A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]

  • Protocol Fuzzing Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

  • Protocols A Decentralized Online Sortition Protocol [Volume 10, Issue 1, 2018, Pages 63-69]

  • Provable Security Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Provable Security Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]

  • ProVerif A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

  • Proxy Re-encryption An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]

  • Proxy Signature An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Public Key Cryptography Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]

  • Public-Key Cryptography QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

  • Public Key Cryptography (PKC) Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix [Volume 15, Issue 3, 2023, Pages 101-108]

  • Public-key Cryptosystem EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

  • Public Key Replacement Attack An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]

  • Publicly verifiable secret sharing A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Python Challenges Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

Q

  • QTRU QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

  • Quantum Channel One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]

  • Quantum Channel Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]

  • Quantum Cryptanalysis Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Quantum Distinguishers Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Quantum Key Recovery Attack Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Quantum Related Key Attack Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Quantum Slide Attack Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Quaternion Algebra QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

  • Query on Encrypted Data Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]

  • Query on Encrypted Data Private Key based query on encrypted data [Volume 4, Issue 1, 2012, Pages 41-50]

  • Query Processing Indexed View Technique to Speed-up Data Warehouse Query Processing [Volume 12, Issue 3, 2020, Pages 81-85]

  • Query Processing SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

R

  • Race Condition Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]

  • Radio frequency identification Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices [Volume 14, Issue 3, 2022, Pages 1-8]

  • Random Graph LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

  • Random Guessing SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Random Key Pre-distribution LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

  • Randomness Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

  • Random Oracle An Efficient Pairing-Free Identity-Based Certificateless Signcryption [Volume 14, Issue 1, 2022, Pages 69-82]

  • Random Oracle Model Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]

  • Random Oracle Model An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]

  • Random Oracle Model Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]

  • Ranking Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]

  • Ransomware Ransomware Detection Based on PE Header Using Convolutional Neural Networks [Volume 14, Issue 2, 2022, Pages 181-192]

  • Rao-Nam Cryptosystem An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

  • Rao-Nam Secret Key Cryptosystem Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes [Volume 4, Issue 1, 2012, Pages 3-14]

  • Rate Estimation Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

  • Reader Compromised Attack A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]

  • Real time detection F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • Recurrent Neural Network Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]

  • Register Placement Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]

  • Registration and Mobility Management Access and Mobility Policy Control at the Network Edge [Volume 11, Issue 3, 2019, Pages 105-111]

  • Reinforcement Learning Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]

  • Reliable data transfer Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

  • Reputation Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]

  • Reputation A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]

  • Reputation Aggregation GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

  • Re-sampling Cognitive Strategic Model applied to a Port System [Volume 11, Issue 3, 2019, Pages 73-78]

  • Re-sampling Enhancing Learning from Imbalanced Classes via Data Preprocessing: A Data-Driven Application in Metabolomics Data Mining [Volume 11, Issue 3, 2019, Pages 79-89]

  • Resilient networks Evaluating Multipath TCP Resilience against Link Failures [Volume 11, Issue 3, 2019, Pages 113-122]

  • Return Oriented Programming Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture [Volume 8, Issue 1, 2016, Pages 39-52]

  • Reverse Engineering ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow [Volume 8, Issue 2, 2016, Pages 93-104]

  • Reverse Engineering Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • Reverse Image-based Search Engine Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]

  • Reverse Image Search Reverse Image-Based Search Engine for IP Trademarks [Volume 12, Issue 3, 2020, Pages 117-127]

  • Revocation Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]

  • Rewriting Rules Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • RFID A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]

  • RFID Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

  • RFID Authentication Protocol Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

  • RFID Authentication Protocols Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

  • RFID Tag Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

  • RFID Tags A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]

  • Ring-LWE A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]

  • Risk Assessment A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]

  • Road-Side Unit(RSU) A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

  • Role-Based Access Control Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]

  • ROM Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]

  • Routing Attack BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms [Volume 4, Issue 1, 2012, Pages 25-39]

  • Runtime Monitoring Safety Guards for Ethereum Smart Contracts [Volume 16, Issue 1, 2024, Pages 37-53]

S

  • Sampling Method Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • SAND Block Cipher Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property [Volume 15, Issue 3, 2023, Pages 139-147]

  • Saudi Arabia The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • SBAC A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]

  • Scalability Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Scalability Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]

  • Scrambled images OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Searchable Encryption SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing [Volume 11, Issue 1, 2019, Pages 15-34]

  • Searchable Encryption Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting [Volume 15, Issue 3, 2023, Pages 1-17]

  • Secrecy Capacity One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel [Volume 14, Issue 3, 2022, Pages 71-80]

  • Secrecy Capacity Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions [Volume 15, Issue 3, 2023, Pages 19-34]

  • Secret Disclosure Attack A note on the security of two improved RFID protocols [Volume 8, Issue 2, 2016, Pages 155-160]

  • Secret Sharing Distributed Contingency Logic and Security [Volume 10, Issue 2, 2018, Pages 107-115]

  • Secret Sharing A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Secure Channel Free Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

  • Secure Cloud Storage Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage [Volume 14, Issue 3, 2022, Pages 135-149]

  • Secure Coding Practices Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

  • Secure communication Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

  • Secure Computation A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]

  • Secure Function Evaluation MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]

  • Secure Information Sharing Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

  • Secure Messaging Authentication Protocol Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]

  • Secure Multiparty Computation Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]

  • Secure Sharing An Efficient Scheme for Secure Medical Data Sharing in the Cloud [Volume 15, Issue 3, 2023, Pages 59-66]

  • Security A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications [Volume 5, Issue 1, 2013, Pages 5-36]

  • Security Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]

  • Security Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

  • Security A Chaos-Based Video Watermarking Algorithm [Volume 4, Issue 1, 2012, Pages 77-86]

  • Security Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

  • Security An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]

  • Security Secure FPGA Design by Filling Unused Spaces [Volume 11, Issue 1, 2019, Pages 47-56]

  • Security Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

  • Security Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • Security A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks [Volume 12, Issue 3, 2020, Pages 19-27]

  • Security IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]

  • Security A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems [Volume 14, Issue 1, 2022, Pages 57-68]

  • Security SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud [Volume 14, Issue 3, 2022, Pages 113-121]

  • Security Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]

  • Security A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack [Volume 15, Issue 3, 2023, Pages 117-128]

  • Security Attacks An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios [Volume 16, Issue 1, 2024, Pages 17-35]

  • Security Evaluation Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]

  • Security Event Management Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]

  • Security of Voting Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • SEIMCHA SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Semantic Image CAPTCHA SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Semantic Web A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]

  • Semi-Supervised Deep Learning Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

  • Sensitive methods A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]

  • Sensor Networks An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]

  • Sensors Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns [Volume 11, Issue 3, 2019, Pages 9-17]

  • Service Quality(INFQ) The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • Session Management Broken Authentication and Session Management Vulnerabilities [Volume 13, Issue 3, 2021, Pages 11-19]

  • SHA-3 Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • Shannon Capacity An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

  • Short-Term Context A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]

  • SIC A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain [Volume 11, Issue 3, 2019, Pages 123-130]

  • Side Channel Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

  • Side-Channel Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • Side Channel Attack A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]

  • Side-Channel Attack Cross-Device Deep Learning Side-Channel Attacks using Filter and Autoencoder [Volume 15, Issue 3, 2023, Pages 149-158]

  • Side-channel attacks A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]

  • Side-channel attacks Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]

  • Signcryption Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]

  • Significance of the Difference Test A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

  • SILCv₁ Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Similar Privacy Setting A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • Singular Value Decomposition Face Recognition Based Rank Reduction SVD Approach [Volume 11, Issue 3, 2019, Pages 39-50]

  • SKINNY Practical Differential Fault Analysis on SKINNY [Volume 14, Issue 3, 2022, Pages 9-19]

  • Sliding mode control Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

  • Sliding Window Preprocessing Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]

  • Slowloris Attack Slowloris Attack Detection Using Adaptive Timeout-Based Approach [Volume 16, Issue 1, 2024, Pages 79-92]

  • Smart city Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL) [Volume 11, Issue 3, 2019, Pages 51-58]

  • Smart Contract Safety Guards for Ethereum Smart Contracts [Volume 16, Issue 1, 2024, Pages 37-53]

  • Smart Home Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • Smart Home The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]

  • Smart Meter Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks [Volume 14, Issue 3, 2022, Pages 101-112]

  • Smart parking Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • Smoothing Power A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]

  • Social Media A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]

  • Social Media Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]

  • Social Networks Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]

  • Social Networks A Sudy on Information Privacy Issue on Social Networks [Volume 11, Issue 3, 2019, Pages 19-27]

  • Social Networks Detection of Fake Accounts in Social Networks Based on One Class Classification [Volume 11, Issue 2, 2019, Pages 173-183]

  • Social Optimum Interdependent Security Game Design over Constrained Linear Influence Networks [Volume 11, Issue 2, 2019, Pages 95-111]

  • Social Secret Sharing A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]

  • Social Simulation A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]

  • Software architecture Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]

  • Software Countermeasure A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]

  • Software Project Management Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase [Volume 11, Issue 3, 2019, Pages 161-172]

  • Software Security Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

  • Software Security Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

  • Solution Norm Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Solving noisy equation system Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]

  • Space Filling Curves Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

  • Spectrogram Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • SPHF A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices [Volume 11, Issue 1, 2019, Pages 75-86]

  • SPIHT Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Spread Spectrum Method Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling [Volume 8, Issue 2, 2016, Pages 131-139]

  • SQLIA detection Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]

  • Sql Injection Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]

  • Sql Injection A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]

  • Sql Injection Secure Coding Guidelines — Python [Volume 13, Issue 3, 2021, Pages 31-38]

  • Stability Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]

  • Stacked Graph Autoencoder Android Malware Detection Using One-Class Graph Neural Networks [Volume 14, Issue 3, 2022, Pages 51-60]

  • Standard Model A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]

  • Standard Model Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]

  • Standard Model An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]

  • Standard Model Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

  • Standard Model Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS [Volume 14, Issue 2, 2022, Pages 193-213]

  • State machine A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]

  • State Recovery Relaxed Differential Fault Analysis of SHA-3 [Volume 11, Issue 2, 2019, Pages 129-143]

  • Static analysis SANT: Static Analysis of Native Threads for Security Vetting of Android Applications [Volume 14, Issue 1, 2022, Pages 13-25]

  • Static Application Security Testing Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]

  • Statistical anomaly detection Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]

  • Steganalysis Eigenvalues-based LSB steganalysis [Volume 4, Issue 2, 2012, Pages 97-106]

  • Steganalysis A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications [Volume 5, Issue 1, 2013, Pages 5-36]

  • Steganalysis Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]

  • Steganalysis Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]

  • Steganalysis New High Secure Network Steganography Method Based on Packet Length [Volume 12, Issue 1, 2020, Pages 24-44]

  • Steganalysis A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis [Volume 14, Issue 1, 2022, Pages 105-113]

  • Steganalysis Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm [Volume 14, Issue 2, 2022, Pages 167-179]

  • Steganography Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]

  • Steganography Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]

  • Steganography Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

  • Steganography Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • STLR algorithm STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]

  • Stream Ciphers Stream ciphers and the eSTREAM project [Volume 2, Issue 1, 2010, Pages 3-11]

  • Stream Mining Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

  • Stripline Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications [Volume 12, Issue 3, 2020, Pages 7-12]

  • ST-Slotted-CS-ALOHA protocol Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]

  • Substitution box (S-box) Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]

  • Support Vector Machines Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors [Volume 11, Issue 2, 2019, Pages 159-171]

  • SVM Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning [Volume 13, Issue 3, 2021, Pages 69-78]

  • Sybil attack A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

  • Symbolic Modeling Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • Symmetric Cipher Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]

  • Symmetric Key Management LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

  • Symmetric Polynomial An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]

  • Synchronization Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

  • System Quality (SERQ) The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

T

  • Tagging Image CAPTCHA SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Tamper Detection A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]

  • Tamper Detection and Recovery Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code [Volume 14, Issue 2, 2022, Pages 147-156]

  • Tamper-resilient Cryptography A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]

  • TDC Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • TDL Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • Template attack A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]

  • TESLA Protocol A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

  • Text Hiding High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]

  • Text Mining Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]

  • Text Steganography High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]

  • Text Watermarking High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]

  • Theorem Proving A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]

  • Threshold access structures A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Threshold Implementation Secure and Low-Area Implementation of the AES Using FPGA [Volume 14, Issue 3, 2022, Pages 93-99]

  • Threshold Secret Sharing Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]

  • Threshold Secret Sharing Scheme On the design and security of a lattice-based threshold secret sharing scheme [Volume 8, Issue 1, 2016, Pages 25-38]

  • Throughput Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology [Volume 12, Issue 3, 2020, Pages 101-109]

  • Time Domain Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]

  • Time-Memory Trade-offs Stream ciphers and the eSTREAM project [Volume 2, Issue 1, 2010, Pages 3-11]

  • Timers A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]

  • Time-series analysis Using Machine Learning ARIMA to Predict the Price of Cryptocurrencies [Volume 11, Issue 3, 2019, Pages 139-144]

  • Time shuffling countermeasure A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack [Volume 14, Issue 1, 2022, Pages 47-55]

  • Timing Attacks Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

  • Timing Side-Channel Attacks A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]

  • Tiny JOP Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

  • TLR algorithm STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]

  • Tor Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

  • Traceability Attack Traceability improvements of a new RFID protocol based on EPC C1 G2 [Volume 8, Issue 2, 2016, Pages 105-114]

  • Traceable Ring Signature A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]

  • Traffic analysis Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

  • Traffic analysis Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]

  • Transaction Address Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]

  • Transcription Factor Binding Site CEMD: A Cluster-based Ensemble Motif Discovery Tool [Volume 12, Issue 3, 2020, Pages 29-36]

  • Trinomials Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]

  • Trivium On the multi _ chi-square tests and their data complexity [Volume 4, Issue 1, 2012, Pages 15-24]

  • True Time Toolbox Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]

  • Trust A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • Trust GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]

  • Trust Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]

  • Trust A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]

  • Trust Aggregation A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • TrustChain On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

  • Trusted Authority(TA) A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs [Volume 15, Issue 3, 2023, Pages 77-89]

  • Trusted Design Platform A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

  • Trust Interval A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • Trust Propagation A confidence-aware interval-based trust model [Volume 4, Issue 2, 2012, Pages 151-165]

  • Tsung IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • T-table implementation Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

  • Twitter Identifying Entrepreneurial Influencers on Twitter [Volume 12, Issue 3, 2020, Pages 59-72]

  • Two-Dimensional Coupled Logistic Map Improving security of double random phase encoding with chaos theory using fractal images [Volume 4, Issue 2, 2012, Pages 115-124]

U

  • Ultimately Periodic Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • Ultra-Large-Scale Systems Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

  • Uncertainty Quantification Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory [Volume 8, Issue 2, 2016, Pages 141-153]

  • Unforgeability of Ticket Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Unified Modeling Language Aspect Oriented UML to ECORE Model Transformation [Volume 11, Issue 3, 2019, Pages 97-103]

  • Unilateral Authentication A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]

  • Uniquely Restricted Matching On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

  • Universal Designated (Multi-) Verifier Signature Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]

  • Untraceability An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]

  • Upright Orientation SEIMCHA: a new semantic image CAPTCHA using geometric transformations [Volume 4, Issue 1, 2012, Pages 63-76]

  • Urban Traffic Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

  • Useless States Cryptanalysis of GSM encryption algorithm A5/1 [Volume 4, Issue 2, 2012, Pages 107-114]

  • Users’Continuance Intention The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • User’sContinuance Intention (CI) The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • User Similarity Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]

  • User’s Satisfaction (SAT) The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia [Volume 12, Issue 3, 2020, Pages 45-53]

  • UWSNs Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance [Volume 11, Issue 3, 2019, Pages 67-72]

V

  • Value of Information A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]

  • Variance Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]

  • Verifiable Secret sharing A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Verification A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]

  • Verification A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving [Volume 8, Issue 1, 2016, Pages 3-24]

  • Verification Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System [Volume 14, Issue 3, 2022, Pages 61-69]

  • Virtualbox Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]

  • Virtual Organization A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]

  • Virtual Training Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]

  • Virtulization Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]

  • VNML Virtualized Network Management Laboratory for Educational Purposes [Volume 11, Issue 3, 2019, Pages 181-186]

  • Voice Over IP Security testing of session initiation protocol implementations [Volume 1, Issue 2, 2009, Pages 91-103]

  • Vulnerability Analysis Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer [Volume 14, Issue 1, 2022, Pages 83-104]

  • Vulnerability Detection Algebraic Matching of Vulnerabilities in a Low-Level Code [Volume 11, Issue 3, 2019, Pages 1-7]

  • Vulnerability Detection Cross Site Scripting Attack Review [Volume 13, Issue 3, 2021, Pages 21-30]

  • Vulnerability Detection Using ChatGPT as a Static Application Security Testing Tool [Volume 15, Issue 3, 2023, Pages 51-58]

W

  • WBANs Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks [Volume 15, Issue 3, 2023, Pages 35-42]

  • Web Application Firewall (WAF) Bypassing Web Application Firewalls Using Deep Reinforcement Learning [Volume 14, Issue 2, 2022, Pages 131-145]

  • Web Application Penetration Tests Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]

  • Web Application Security Open Web Application Security Project Components with Known Vulnerabilities: A Comprehensive Study [Volume 13, Issue 3, 2021, Pages 59-67]

  • Web Application Security Modified Parse-Tree Based Pattern Extraction Approach for Detecting SQLIA Using Neural Network Model. [Volume 16, Issue 1, 2024, Pages 1-16]

  • Web Application Vulnerabilities Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner [Volume 16, Issue 1, 2024, Pages 55-77]

  • WebAssembly A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly [Volume 14, Issue 1, 2022, Pages 27-46]

  • Web-Based System A Review Study on SQL Injection Attacks, Prevention, and Detection [Volume 13, Issue 3, 2021, Pages 1-10]

  • Web of Things IoT Protocols Based Fog/Cloud over High Traffic [Volume 11, Issue 3, 2019, Pages 173-180]

  • Web Robots A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

  • Web Security Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]

  • Web Service Composition A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]

  • White-Box An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]

  • Whitewashing On the Suitability of Improved TrustChain for Smartphones [Volume 14, Issue 3, 2022, Pages 33-42]

  • Wireless Network Control System(WNCS) Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]

  • Wireless Networks Medical Image Compression Based on Region of Interest [Volume 11, Issue 3, 2019, Pages 29-34]

  • Wireless Networks The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices [Volume 11, Issue 3, 2019, Pages 35-38]

  • Wireless Sensor Network LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

  • Wireless Sensor Networks Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]

  • Wireless Sensor Networks, the More the Safe, the Less the Unsafe Policy, Unauthenticated Events Unauthenticated event detection in wireless sensor networks using sensors co-coverage [Volume 8, Issue 1, 2016, Pages 61-71]

  • WLAN An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]

  • Wormhole Attack A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]

  • Wormhole Detection Scheme A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]

  • Wormhole Tunnel A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]

  • WSN A novel key management scheme for heterogeneous sensor networks based on the position of nodes [Volume 8, Issue 2, 2016, Pages 115-130]

X

  • XACML An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

Z

  • Zernike Moments An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]

  • ZigBee Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox [Volume 12, Issue 3, 2020, Pages 13-17]

  • ZK-SNARKs An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs [Volume 14, Issue 3, 2022, Pages 123-133]

  • Zorro Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]