A

  • Access Control IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]

  • Android Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

  • Android Malware Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

  • Attribute-Based Searchable Encryption Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

  • Authentication Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

B

  • Bag-Of-Visual-Words File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]

  • BKZ Simulation Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Blind Signature An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • BOVW File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]

C

  • Clustering OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Coefficient Vector Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Configurable Look Up Tables(CFGLUTs) An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]

  • Content-Based Image Retrieval(CBIR) OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Controllable point Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • CPA Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • Curious-Monkey Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

D

  • Digital Forensics File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]

  • Dynamic analysis Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

E

  • ECDLP An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Event Generator Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

  • Evict+Time attack Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]

F

  • Feature Extraction OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Field Programmable Gate Array Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • File Type Classification File Fragment Type Classification by Bag-Of-Visual-Words [Volume 13, Issue 2, 2021, Pages 101-116]

  • FPGA Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • FPGA‎ A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

G

  • GNR Enumeration Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

H

  • Hardware Security An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]

  • Hardware Trojan Horses (HTHs) An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]

  • Hidden Policy Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

I

  • ID-based Framework An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Inclusive memory Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]

  • Insecure Direct Object Reference (IDOR) IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]

  • Internet of Things (IoT) Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

K

  • Keyword Guessing Attack Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

L

  • LRU replacement policy Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets [Volume 13, Issue 1, 2021, Pages 19-27]

M

  • Message Recovery An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

  • Monkey Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware [Volume 13, Issue 2, 2021, Pages 131-143]

O

  • Obfuscation An Obfuscation Method Based on CFGLUTs for Security of FPGAs [Volume 13, Issue 2, 2021, Pages 157-162]

  • Observable points Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • Optimal Bounding Function Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Otsu’s threshold (OT) OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

P

  • Partial Reconfiguration A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

  • Power Sensor Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • Privacy Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

  • Proxy Signature An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery [Volume 13, Issue 1, 2021, Pages 59-72]

R

  • RFID Tag Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]

S

  • Sampling Method Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Scrambled images OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing [Volume 13, Issue 1, 2021, Pages 1-17]

  • Secure Channel Free Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

  • Security Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing [Volume 13, Issue 1, 2021, Pages 47-57]

  • Security IDOT: Black-Box Detection of Access Control Violations in Web Applications [Volume 13, Issue 2, 2021, Pages 117-129]

  • Side-Channel Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • Solution Norm Better Sampling Method of Enumeration Solution for BKZ-Simulation [Volume 13, Issue 2, 2021, Pages 177-208]

  • Standard Model Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud [Volume 13, Issue 2, 2021, Pages 87-100]

T

  • TDC Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • TDL Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks [Volume 13, Issue 2, 2021, Pages 163-176]

  • Trusted Design Platform A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration [Volume 13, Issue 1, 2021, Pages 29-45]

U

  • Urban Traffic Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case [Volume 13, Issue 1, 2021, Pages 73-85]