A

  • ABAC A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]

  • Access Control A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]

  • Accountability A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]

  • Attack resistance A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]

  • Authenticated Encryption Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

B

  • Bit-parallel Multiplier Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]

C

  • CAESAR Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Clock Tree Construction Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]

  • Clustering A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]

  • CLΟCv₁ Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Collusion A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]

  • Combinatorial Optimization Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

D

  • Dedekind Domain EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

  • Discrete Imperialist Competitive Algorithm Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

  • Distinguishing Attack Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

E

  • Elliptic Curve Cryptography Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]

  • EPC C1 G2 Standard Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

F

  • Forgery Attack Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

G

  • Genetic algorithm Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

  • GGH EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

  • Gossip Algorithm GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

  • Group Based P2P Systems GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

  • Group Based Reputation GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

H

  • Hardware Security Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]

L

  • Lattice-based Cryptography EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

M

  • Microaggregation A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]

  • Multi-secret Sharing Scheme Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]

  • Multi-stage Secret Sharing Scheme Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]

O

  • Optimistic Fair Exchange A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]

P

  • Pair-wise Least Significant Bit matching Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

  • Peer to Peer Network GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

  • Pentanomials Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]

  • Persian Abstract Persian Abstract [Volume 7, Issue 2, 2015, Pages 167-172]

  • Polynomial Representation EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

  • Privacy Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

  • Privacy Preserving Data Publishing A novel local search method for microaggregation [Volume 7, Issue 1, 2015, Pages 15-26]

  • Private-key Cryptosystem Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]

  • Provable Security Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]

  • Public-key Cryptosystem EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations [Volume 7, Issue 2, 2015, Pages 115-126]

R

  • Register Placement Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability [Volume 7, Issue 1, 2015, Pages 75-81]

  • Reputation A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]

  • Reputation Aggregation GGRA: a grouped gossip-based reputation aggregation algorithm [Volume 7, Issue 1, 2015, Pages 59-74]

  • RFID Authentication Protocol Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

S

  • SBAC A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]

  • Security Enhancing privacy of recent authentication schemes for low-cost RFID systems [Volume 7, Issue 2, 2015, Pages 135-149]

  • Semantic Web A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]

  • SILCv₁ Cryptanalysis of some first round CAESAR candidates [Volume 7, Issue 2, 2015, Pages 127-134]

  • Space Filling Curves Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

  • Standard Model A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]

  • Standard Model Computationally secure multiple secret sharing: models, schemes, and formal security analysis [Volume 7, Issue 2, 2015, Pages 91-99]

  • Steganography Optimizing image steganography by combining the GA and ICA [Volume 7, Issue 1, 2015, Pages 47-58]

T

  • Traceable Ring Signature A traceable optimistic fair exchange protocol in the standard model [Volume 7, Issue 1, 2015, Pages 3-14]

  • Trinomials Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields [Volume 7, Issue 2, 2015, Pages 101-114]

  • Trust A collusion mitigation scheme for reputation systems [Volume 7, Issue 2, 2015, Pages 151-166]

V

  • Virtual Organization A combination of semantic and attribute-based access control model for virtual organizations [Volume 7, Issue 1, 2015, Pages 27-45]