A

  • Access Control Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]

  • Anomaly A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]

B

  • Batch and Online Learning Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]

  • Botnet Detection BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]

  • Botnet Life-Cycle BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]

C

  • CAESAR Competition Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Chinese Remainder Theorem Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]

  • Cloud Server On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Contingency Logic Distributed Contingency Logic and Security [Volume 10, Issue 2, 2018, Pages 107-115]

  • Cryptanalysis Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]

  • Cryptanalysis Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • CTRU NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]

D

  • D2D communications An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]

  • Deoxys-BC Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Distinguisher Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Distributed Contingency Distributed Contingency Logic and Security [Volume 10, Issue 2, 2018, Pages 107-115]

E

  • Eavesdropper Attack On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Encrypted traffic Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]

F

  • Feature Extraction Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]

  • Finite Fields NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]

H

  • Heuristic Algorithm BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]

  • Host-Based Intrusion Detection BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle [Volume 10, Issue 1, 2018, Pages 55-61]

I

  • Impossible Differential Impossible Differential Cryptanalysis on Deoxys-BC-256 [Volume 10, Issue 2, 2018, Pages 93-105]

  • Internet of Things A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]

  • Intrusion Detection A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]

  • IT Security A Survey of Anomaly Detection Approaches in Internet of Things [Volume 10, Issue 2, 2018, Pages 79-92]

L

  • Lattice-based Cryptography NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]

M

  • Malicious URLs Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]

  • Matrix Rings NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem [Volume 10, Issue 1, 2018, Pages 45-53]

  • Mechanism Design A Decentralized Online Sortition Protocol [Volume 10, Issue 1, 2018, Pages 63-69]

  • Midori Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) [Volume 10, Issue 1, 2018, Pages 3-13]

  • MITM Attack Distributed Contingency Logic and Security [Volume 10, Issue 2, 2018, Pages 107-115]

  • Multi-class Classification Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]

N

  • Network management Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]

O

  • O-PSI On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Outsourced Data Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]

P

  • Private Set Intersection (PSI) On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) [Volume 10, Issue 2, 2018, Pages 117-127]

  • Protocols A Decentralized Online Sortition Protocol [Volume 10, Issue 1, 2018, Pages 63-69]

R

  • Role-Based Access Control Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version) [Volume 10, Issue 2, 2018, Pages 129-139]

S

  • Secret Sharing Distributed Contingency Logic and Security [Volume 10, Issue 2, 2018, Pages 107-115]

  • Security An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks [Volume 10, Issue 1, 2018, Pages 15-27]

T

  • Traffic analysis Classification of encrypted traffic for applications based on statistical features [Volume 10, Issue 1, 2018, Pages 29-43]

W

  • Web Security Feature-based Malicious URL and attack type detection using multi-class classification [Volume 10, Issue 2, 2018, Pages 141-162]