A
-
ABAC
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
-
Access Control
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
-
Accountability
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
-
Attack resistance
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
-
Authenticated Encryption
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
B
-
Bit-parallel Multiplier
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
C
-
CAESAR
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
-
Clock Tree Construction
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]
-
Clustering
A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]
-
CLΟCv₁
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
-
Collusion
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
-
Combinatorial Optimization
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
D
-
Dedekind Domain
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
-
Discrete Imperialist Competitive Algorithm
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
-
Distinguishing Attack
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
E
-
Elliptic Curve Cryptography
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
-
EPC C1 G2 Standard
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
F
-
Forgery Attack
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
G
-
Genetic algorithm
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
-
GGH
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
-
Gossip Algorithm
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
-
Group Based P2P Systems
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
-
Group Based Reputation
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
H
-
Hardware Security
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]
L
-
Lattice-based Cryptography
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
M
-
Microaggregation
A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]
-
Multi-secret Sharing Scheme
Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]
-
Multi-stage Secret Sharing Scheme
Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]
O
-
Optimistic Fair Exchange
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
P
-
Pair-wise Least Significant Bit matching
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
-
Peer to Peer Network
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
-
Pentanomials
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
-
Persian Abstract
Persian Abstract [Volume 7, Issue 2, 2015, Pages 167-172]
-
Polynomial Representation
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
-
Privacy
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
-
Privacy Preserving Data Publishing
A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]
-
Private-key Cryptosystem
Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]
-
Provable Security
Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]
-
Public-key Cryptosystem
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]
R
-
Register Placement
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]
-
Reputation
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
-
Reputation Aggregation
GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]
-
RFID Authentication Protocol
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
S
-
SBAC
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
-
Security
Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]
-
Semantic Web
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]
-
SILCv₁
Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]
-
Space Filling Curves
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
-
Standard Model
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
-
Standard Model
Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]
-
Steganography
Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]
T
-
Traceable Ring Signature
A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]
-
Trinomials
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]
-
Trust
A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]
V
-
Virtual Organization
A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]