A

  • Access Control A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]

  • Access Control Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

  • Arabic E-Text High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]

  • Attack Scenario A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]

  • Authorization Model Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

C

  • Cost-Sensitive Attack Graph A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]

  • Countermeasure A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]

  • Cryptology Stream ciphers and the eSTREAM project [Volume 2, Issue 1, 2010, Pages 3-11]

D

  • Dynamic Environment Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

  • Dynamic Permission-Activation A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]

  • Dynamic Role-Assignment A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]

E

  • Empirical Matrix Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]

  • Evolutionary Fuzzy System A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]

F

  • Feature Coding High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]

  • Fuzzy Rule Extraction A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]

I

  • Intrusion Detection System A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection [Volume 2, Issue 1, 2010, Pages 33-46]

K

  • Kashida High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]

  • Key Management An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]

L

  • Long-Term Context A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]

M

  • Minimization Analysis A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]

  • Multi Objective Decision Making Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

P

  • Particle Swarm Optimization A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs [Volume 2, Issue 1, 2010, Pages 13-32]

  • Perturbed Quantization (PQ) Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]

  • Pervasive Computing Environment A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]

  • Probabilistic Key Sharing An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]

S

  • Secure Information Sharing Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

  • Security Authorization models for secure information sharing: a survey and research agenda [Volume 2, Issue 2, 2010, Pages 69-87]

  • Sensor Networks An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]

  • Short-Term Context A context-sensitive dynamic role-based access control model for pervasive computing environments [Volume 2, Issue 1, 2010, Pages 47-66]

  • Steganalysis Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]

  • Steganography Detection of perturbed quantization (PQ) steganography based on empirical matrix [Volume 2, Issue 2, 2010, Pages 119-128]

  • Stream Ciphers Stream ciphers and the eSTREAM project [Volume 2, Issue 1, 2010, Pages 3-11]

  • Symmetric Polynomial An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks [Volume 2, Issue 2, 2010, Pages 89-105]

T

  • Text Hiding High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]

  • Text Steganography High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]

  • Text Watermarking High capacity steganography tool for Arabic text using 'Kashida' [Volume 2, Issue 2, 2010, Pages 107-118]

  • Time-Memory Trade-offs Stream ciphers and the eSTREAM project [Volume 2, Issue 1, 2010, Pages 3-11]