Access Control Policy (ACP)
A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]
Alert Correlation
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
Anonymity of Voter
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
BPEL
A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]
C
Computer Security
Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]
Computer Systems
Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]
Constrained Policy Graph (CPG)
A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]
D
Database Outsourcing
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
Database Security
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
DWT
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
NTRU
QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]
P
Perceptibility of Double Voting
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
Plan Recognition
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
Public-Key Cryptography
QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]
Q
QTRU
QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]
Quaternion Algebra
QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]
Query on Encrypted Data
Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]
S
Scalability
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
Security of Voting
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
SPIHT
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]
Stream Mining
Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]
U
Unforgeability of Ticket
Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]
V
Verification
A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]
W
Web Service Composition
A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]