A

  • Access Control Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • AES Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

  • Anomaly Detection F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • Attribute-Based Encryption Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Authenticated Cipher CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • AVISPA GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

B

C

  • CiliPadi Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Cloud Storage Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • COLM CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • CPA CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

  • Cryptography A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Cube Attack Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]

D

  • Data stream algorithm F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • DDoS detection F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

  • Deep seq2seq network Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]

  • DOM CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking [Volume 12, Issue 2, 2020, Pages 67-80]

E

  • EHR Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Electronic health record Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems [Volume 12, Issue 2, 2020, Pages 129-140]

  • Embedding Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism [Volume 12, Issue 1, 2020, Pages 44-54]

  • Expected Profile Update Time F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

F

  • Flush+Reload attack Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

  • Fractional-order systems Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

G

  • GAGE Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Group-based handover authentication GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

I

  • InGAGE Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • IoT GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

M

  • M2M communication GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • Memory de-duplication Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

  • Microaggregation Improved Univariate Microaggregation for Integer Values [Volume 12, Issue 1, 2020, Pages 35-43]

N

  • Network Security GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication [Volume 12, Issue 2, 2020, Pages 101-111]

  • NIST lightweight cryptography competition Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Non-homogeneous linear recursions A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

P

  • Preimage attack Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants [Volume 12, Issue 1, 2020, Pages 13-23]

  • Probabilistic equation Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]

  • Publicly verifiable secret sharing A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

R

  • Real time detection F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management [Volume 12, Issue 2, 2020, Pages 113-128]

S

  • Secret Sharing A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • Secure communication Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

  • Sliding mode control Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

  • Solving noisy equation system Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher [Volume 12, Issue 1, 2020, Pages 1-12]

  • Steganalysis New High Secure Network Steganography Method Based on Packet Length [Volume 12, Issue 1, 2020, Pages 24-44]

  • Synchronization Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption [Volume 12, Issue 1, 2020, Pages 55-66]

T

  • Threshold access structures A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]

  • T-table implementation Enhanced Flush+Reload Attack on AES [Volume 12, Issue 2, 2020, Pages 81-89]

V

  • Verifiable Secret sharing A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions [Volume 12, Issue 2, 2020, Pages 91-99]