A

  • Access Control Policy (ACP) A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]

  • Alert Correlation Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

  • Anonymity of Voter Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

B

  • Blind Signature Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • BPEL A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]

C

  • Computer Security Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]

  • Computer Systems Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]

  • Constrained Policy Graph (CPG) A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]

D

  • Database Outsourcing Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]

  • Database Security Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]

  • DWT Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

E

  • Electronic Voting Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Encrypted Database Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]

  • Encryption QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

G

  • Genetic Algorithms Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

H

  • Hidden Markov Model Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

I

  • Image Watermarking Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Intelligent Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Internet Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]

  • Intrusion Detection Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

M

  • Multiresolution Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Multistep Attack Scenario Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

N

  • Networking Infrastructure Computer security in the future [Volume 3, Issue 1, 2011, Pages 3-27]

  • NTRU QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

P

  • Perceptibility of Double Voting Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • Plan Recognition Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

  • Public-Key Cryptography QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

Q

  • QTRU QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

  • Quaternion Algebra QTRU: quaternionic version of the NTRU public-key cryptosystems [Volume 3, Issue 1, 2011, Pages 29-42]

  • Query on Encrypted Data Separating indexes from data: a distributed scheme for secure database outsourcing [Volume 3, Issue 2, 2011, Pages 121-133]

S

  • Scalability Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Security of Voting Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

  • SPIHT Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms [Volume 3, Issue 1, 2011, Pages 51-66]

  • Stream Mining Alert correlation and prediction using data mining and HMM [Volume 3, Issue 2, 2011, Pages 77-101]

U

  • Unforgeability of Ticket Double voter perceptible blind signature based electronic voting protocol [Volume 3, Issue 1, 2011, Pages 43-50]

V

  • Verification A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]

W

  • Web Service Composition A model for specification, composition and verification of access control policies and its application to web services [Volume 3, Issue 2, 2011, Pages 103-120]