A

  • Access Control Policies An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

  • Alternating Cycle Free Matching On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

  • Attacker Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Audio scrambling system Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • Automated Testing An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

C

  • Certificateless Signcryption Scheme An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]

  • Channel Coding An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

  • Cipher text only attack Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • Code Based Cryptography An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

  • Code Injection Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

  • Code Reuse Attacks Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

  • Computational Complexity On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

  • Continuous Non-malleability A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]

  • Cryptanalysis Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

D

  • DPA A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]

E

  • Embedded Systems Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

F

  • Feature Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Feature Extraction Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]

  • Feature Line Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]

  • Fixed Parameter Tractable On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

  • Forcing Number On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

G

  • Graph Coloring LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

  • Guess-and-determine Attack On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

I

  • Implementation of Access Control An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

J

  • Jigsaw puzzle Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • Jump Number On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

  • Jump Oriented Programming Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

K

  • Kernel Trapper Gadget Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

L

  • Leakage-resilient A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]

M

  • Machine Learning Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Malicious-but-passive Key Generation Center Attack An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]

  • Malicious web pages Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

  • Model Based Technique An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]

  • Multimedia encryption systems Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

N

  • No Keyword Editorial [Volume 9, Issue 2, 2017, Pages 99-100]

  • No Keyword Persian Abstract [Volume 9, Issue 2, 2017, Pages 183-189]

  • No Keywords Persian Abstract [Volume 9, Issue 1, 2017, Pages 93-98]

  • Non-malleable A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]

  • NP-complete On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

O

  • Obfuscation Analyzing new features of infected web content in detection of malicious web pages [Volume 9, Issue 2, 2017, Pages 161-181]

P

  • Phishing Detection Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]

  • Polar Codes An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

  • Probabilistic Key Sharing LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

  • Public Key Replacement Attack An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]

R

  • Random Graph LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

  • Random Key Pre-distribution LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

  • Random Oracle Model An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]

  • Rao-Nam Cryptosystem An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

S

  • Shannon Capacity An efficient secure channel coding scheme based on polar codes [Volume 9, Issue 2, 2017, Pages 111-118]

  • Side Channel Side channel parameter characteristics of code injection attacks [Volume 9, Issue 1, 2017, Pages 17-26]

  • Side Channel Attack A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]

  • Smoothing Power A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]

  • Software Countermeasure A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study [Volume 9, Issue 2, 2017, Pages 119-130]

  • Software Security Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

  • Spectrogram Cipher text only attack on speech time scrambling systems using correction of audio spectrogram [Volume 9, Issue 2, 2017, Pages 131-145]

  • Standard Model An efficient certificateless signcryption scheme in the standard model [Volume 9, Issue 1, 2017, Pages 3-16]

  • Symmetric Key Management LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

T

  • Tamper-resilient Cryptography A new security proof for FMNV continuous non-malleable encoding scheme [Volume 9, Issue 1, 2017, Pages 41-51]

  • Tiny JOP Dwarf Frankenstein is still in your memory: tiny code reuse attacks [Volume 9, Issue 1, 2017, Pages 53-72]

U

  • Uniquely Restricted Matching On the computational complexity of finding a minimal basis for the guess and determine attack [Volume 9, Issue 2, 2017, Pages 101-110]

V

  • Virtual Training Phishing website detection using weighted feature line embedding [Volume 9, Issue 2, 2017, Pages 147-159]

W

  • Wireless Sensor Network LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring [Volume 9, Issue 1, 2017, Pages 27-39]

X

  • XACML An automatic test case generator for evaluating implementation of access control policies [Volume 9, Issue 1, 2017, Pages 73-91]