A

  • Access Control Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

  • Access Control A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • Anonymity Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

  • Artemia Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Authenticated Encryption Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Authentication Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Authentication and Non-repudiation An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]

B

  • Behavioral Patterns of Web Visitors A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

  • Blind Steganalysis An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]

  • Broadcast Authentication Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]

C

  • Cellular Network An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]

  • Characteristic Function Moments An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]

  • Colored-Petri-Nets Model Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

  • Confidentiality A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • Contourlet Transform An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]

D

  • Database Security A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]

  • Data-Distribution-Service Middleware Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

  • DBSCAN A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

  • Density Based Clustering A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

  • Differential Attack Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]

F

  • Fairness Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

H

  • Heterogeneous Network An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]

I

  • Inter-Transaction Dependency A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]

  • Inter-Transaction Sequence A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]

  • Intrusion Detection A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]

K

  • Key Management System Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]

L

  • Lightweight Block Cipher Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]

  • Linear Attack Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]

M

  • Middleware Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

  • Mobile ad-hoc Networks A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]

O

  • Online Social Network A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

P

  • Privacy A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • Privacy Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Provable Security Artemia: a family of provably secure authenticated encryption schemes [Volume 6, Issue 2, 2014, Pages 125-139]

  • Public Key Cryptography Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]

R

  • Randomness Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

  • Risk Assessment A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]

S

  • Secure Computation A risk model for cloud processes [Volume 6, Issue 2, 2014, Pages 99-123]

  • Significance of the Difference Test A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

  • Similar Privacy Setting A centralized privacy-preserving framework for online social networks [Volume 6, Issue 1, 2014, Pages 35-52]

  • State machine A hybrid approach for database intrusion detection at transaction and inter-transaction levels [Volume 6, Issue 2, 2014, Pages 155-167]

T

  • Timing Attacks Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

  • Tor Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

  • Traffic analysis Improving Tor security against timing and traffic analysis attacks with fair randomization [Volume 6, Issue 1, 2014, Pages 67-76]

U

  • Ultra-Large-Scale Systems Access control in ultra-large-scale systems using a data-centric middleware [Volume 6, Issue 1, 2014, Pages 3-22]

V

W

  • Web Robots A density based clustering approach to distinguish between web robot and human requests to a web server [Volume 6, Issue 1, 2014, Pages 77-89]

  • Wireless Sensor Networks Toward an energy efficient PKC-based key management system for wireless sensor networks [Volume 6, Issue 1, 2014, Pages 53-66]

  • WLAN An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks [Volume 6, Issue 2, 2014, Pages 141-153]

  • Wormhole Attack A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]

  • Wormhole Detection Scheme A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]

  • Wormhole Tunnel A two-phase wormhole attack detection scheme in MANETs [Volume 6, Issue 2, 2014, Pages 183-191]

Z

  • Zernike Moments An extended feature set for blind image steganalysis in contourlet domain [Volume 6, Issue 2, 2014, Pages 169-181]

  • Zorro Total break of Zorro using linear and differential attacks [Volume 6, Issue 1, 2014, Pages 23-34]