CPU Register Values
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]
D
Danger Theory
STLR: a novel danger theory based structural TLR algorithm [Volume 5, Issue 2, 2013, Pages 209-225]
Data hiding
A survey on digital data hiding schemes: principals, algorithms, and applications [Volume 5, Issue 1, 2013, Pages 5-36]
Deniable Authentication
Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]
Dynamic analysis
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]
E
Electronic Voting
Convertible limited (multi-) verifier signature: new constructions and applications [Volume 5, Issue 2, 2013, Pages 189-208]
Elliptic Curve Cryptography
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]
F
Formal Methods
Design and formal verification of DZMBE+ [Volume 5, Issue 1, 2013, Pages 37-53]
Frequency Domain
Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]
G
Group
GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]
GTrust
GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]
I
Identity-Based Cryptography
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]
Image Encryption
Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]
Information Propagation
A computational model and convergence theorem for rumor dissemination in social networks [Volume 5, Issue 2, 2013, Pages 141-154]
K
Key Agreement Protocol
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]
Key Image
Image encryption based on chaotic tent map in time and frequency domains [Volume 5, Issue 1, 2013, Pages 97-110]
M
Malware Detection
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers [Volume 5, Issue 1, 2013, Pages 71-82]
Maximum Likelihood Decoding
Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]
Metagraph
GTrust: a group based trust model [Volume 5, Issue 2, 2013, Pages 155-170]
Multiplicative Video Watermarking
Robust multiplicative video watermarking using statistical modeling [Volume 5, Issue 1, 2013, Pages 83-95]
N
Non-Monotonic Logic
A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]
P
Pervasive Computing Environment
A semantic-aware role-based access control model for pervasive computing environments [Volume 5, Issue 2, 2013, Pages 119-140]
R
Random Oracle Model
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC [Volume 5, Issue 1, 2013, Pages 55-70]
Reputation
Prediction of user's trustworthiness in web-based social networks via text mining [Volume 5, Issue 2, 2013, Pages 171-187]