Authentication
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]
Authorization
CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]
B
Bilateral Authentication
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
Biometric Encryption
A collusion attack on the fuzzy vault scheme [Volume 1, Issue 1, 2009, Pages 27-34]
Blindness
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]
Blind Signature
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]
Concentration measure
Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]
Context Awareness
CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]
D
Dispersion measure
Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]
E
Elliptic Curves Cryptosystems
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem [Volume 1, Issue 2, 2009, Pages 125-131]
Entity Authentication
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
EWMA techniques
Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]
F
Fuzzy Vault
A collusion attack on the fuzzy vault scheme [Volume 1, Issue 1, 2009, Pages 27-34]
G
GSM
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
Information Flow Control
CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]
Intrusion Detection
Moving dispersion method for statistical anomaly detection in intrusion detection systems [Volume 1, Issue 2, 2009, Pages 71-90]
M
Mandatory Access Control
CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]
Man-in-the-Middle Attack
A TESLA-based mutual authentication protocol for GSM networks [Volume 1, Issue 1, 2009, Pages 3-15]
Multilevel Security
CAMAC: a context-aware mandatory access control model [Volume 1, Issue 1, 2009, Pages 35-54]
N
Neural Net
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
P
Parallel Sessions
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]
Perceptrons
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
Pixel-Value Differencing
Steganalysis of embedding in difference of image pixel pairs by neural network [Volume 1, Issue 1, 2009, Pages 17-26]
Process Algebra
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]
Security
Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions [Volume 1, Issue 1, 2009, Pages 55-67]