Home
Keyword Index
A
ABAC
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
Access Control
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
Accountability
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
Attack resistance
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
Authenticated Encryption
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
B
Bit-parallel Multiplier
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
C
CAESAR
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
Clock Tree Construction
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]
Clustering
A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]
CLΟCv₁
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
Collusion
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
Combinatorial Optimization
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
D
Dedekind Domain
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
Discrete Imperialist Competitive Algorithm
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
Distinguishing Attack
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
E
Elliptic Curve Cryptography
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
EPC C1 G2 Standard
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
F
Forgery Attack
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
G
Genetic algorithm
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
GGH
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
Gossip Algorithm
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
Group Based P2P Systems
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
Group Based Reputation
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
H
Hardware Security
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]
L
Lattice-based Cryptography
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
M
Microaggregation
A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]
Multi-secret Sharing Scheme
Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]
Multi-stage Secret Sharing Scheme
Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]
O
Optimistic Fair Exchange
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
P
Pair-wise Least Significant Bit matching
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
Peer to Peer Network
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
Pentanomials
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
Persian Abstract
Persian Abstract [Volume 7, Issue 2, 2015, Pages 167-172]
Polynomial Representation
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
Privacy
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
Privacy Preserving Data Publishing
A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]
Private-key Cryptosystem
Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]
Provable Security
Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]
Public-key Cryptosystem
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
R
Register Placement
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]
Reputation
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
Reputation Aggregation
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
RFID Authentication Protocol
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
S
SBAC
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
Security
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
Semantic Web
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
SILCv₁
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
Space Filling Curves
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
Standard Model
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
Standard Model
Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]
Steganography
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
T
Traceable Ring Signature
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
Trinomials
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
Trust
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
V
Virtual Organization
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]